


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 15
Volume 15, Number 1, January - February 2018
- Jaideep Vaidya

:
Editorial. 1 - Arash Nourian, Stuart E. Madnick:

A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet. 2-13 - Saurabh Shintre, Virgil D. Gligor, João Barros:

Anonymity Leakage in Private VoIP Networks. 14-26 - Ximeng Liu

, Kim-Kwang Raymond Choo
, Robert H. Deng
, Rongxing Lu, Jian Weng
:
Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers. 27-39 - Domenico Cotroneo, Anna Lanzaro, Roberto Natella

:
Faultprog: Testing the Accuracy of Binary-Level Software Fault Injection. 40-53 - Xianfu Meng, Dongxu Liu:

GeTrust: A Guarantee-Based Trust Model in Chord-Based P2P Networks. 54-68 - Attila Altay Yavuz

:
Immutable Authentication and Integrity Schemes for Outsourced Databases. 69-82 - Andrea Saracino

, Daniele Sgandurra, Gianluca Dini, Fabio Martinelli:
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention. 83-97 - Peng Zhou

, Rocky K. C. Chang
, Xiaojing Gu, Minrui Fei, Jianying Zhou
:
Magic Train: Design of Measurement Methods against Bandwidth Inflation Attacks. 98-111 - Dongdong Zhao, Wenjian Luo, Ran Liu

, Lihua Yue:
Negative Iris Recognition. 112-125 - Yuchang Mo, Liudong Xing, Joanne Bechta Dugan:

Performability Analysis of k-to-l-Out-of-n Computing Systems Using Binary Decision Diagrams. 126-137 - Fumio Machida, Ruofan Xia, Kishor S. Trivedi:

Performability Modeling for RAID Storage Systems by Markov Regenerative Process. 138-150 - Jin-Hee Cho, Ing-Ray Chen:

PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks. 151-165 - Jiao Jiao Jiang

, Sheng Wen
, Shui Yu
, Yang Xiang, Wanlei Zhou
:
Rumor Source Identification in Social Networks with Time-Varying Topology. 166-179
Volume 15, Number 2, March - April 2018
- Hung-Min Sun, Shiuan-Tung Chen, Jyh-Haw Yeh, Chia-Yun Cheng:

A Shoulder Surfing Resistant Graphical Authentication System. 180-193 - Bing Li, Dijiang Huang

, Zhijie Wang, Yan Zhu
:
Attribute-based Access Control for ICN Naming Scheme. 194-206 - Nai-Wen Chang

, Sun-Yuan Hsieh
:
Conditional Diagnosability of (n, k)-Star Graphs Under the PMC Model. 207-216 - Xinxin Zhao, Lingjun Li, Guoliang Xue

, Gail-Joon Ahn
:
Efficient Anonymous Message Submission. 217-230 - Yan Li, Yingjiu Li, Ke Xu, Qiang Yan, Robert H. Deng

:
Empirical Study of Face Authentication Systems Under OSNFD Attacks. 231-245 - Eduardo Adílio Pelinson Alchieri, Alysson Bessani

, Fabíola Greve, Joni da Silva Fraga:
Knowledge Connectivity Requirements for Solving Byzantine Consensus with Unknown Participants. 246-259 - Taeho Jung

, Junze Han, Xiang-Yang Li
:
PDA: Semantically Secure Time-Series Data Analytics with Dynamic User Groups. 260-274 - Thomas Roth

, Bruce M. McMillin:
Physical Attestation in the Smart Grid for Distributed State Verification. 275-288 - Martin Goll, Shay Gueron

:
Randomness Tests in Hostile Environments. 289-294 - Naeimeh Laleh, Barbara Carminati

, Elena Ferrari:
Risk Assessment in Social Networks Based on User Anomalous Behaviors. 295-308 - Weili Han

, Zhigong Li, Minyue Ni, Guofei Gu, Wenyuan Xu:
Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis. 309-320 - Fengwei Zhang

, Kevin Leach, Angelos Stavrou
, Haining Wang:
Towards Transparent Debugging. 321-335 - Nosayba El-Sayed, Bianca Schroeder:

Understanding Practical Tradeoffs in HPC Checkpoint-Scheduling Policies. 336-350 - Chia-Chen Wei, Chun-An Chen, Sun-Yuan Hsieh

:
Conditional (t, k)-Diagnosis in Regular and Irregular Graphs Under the Comparison Diagnosis Model. 351-356 - Myungsun Kim, Hyung Tae Lee

, San Ling
, Huaxiong Wang:
On the Efficiency of FHE-Based Private Queries. 357-363
Volume 15, Number 3, May - June 2018
- Elias Bou-Harb

, Chadi Assi
, Mourad Debbabi
:
CSC-Detector: A System to Infer Large-Scale Probing Campaigns. 364-377 - Fanfu Zhou

, Zhengwei Qi
, Jianguo Yao
, Ruhui Ma, Bin Wang, Athanasios V. Vasilakos
, Haibing Guan:
D2FL: Design and Implementation of Distributed Dynamic Fault Localization. 378-392 - David A. Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig

, Ralf Sasse
, Pawel Szalachowski:
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure. 393-408 - Hui Cui

, Zhiguo Wan
, Robert H. Deng
, Guilin Wang, Yingjiu Li:
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud. 409-422 - Hossen Asiful Mustafa

, Wenyuan Xu, Ahmad-Reza Sadeghi, Steffen Schulz:
End-to-End Detection of Caller ID Spoofing Attacks. 423-436 - Dmitry Evtyushkin

, Jesse Elwell
, Meltem Ozsoy, Dmitry Ponomarev, Nael B. Abu-Ghazaleh
, Ryan Riley:
Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications. 437-451 - Petr Novotný, Bong Jun Ko, Alexander L. Wolf

:
Locating Faults in MANET-Hosted Software Systems. 452-465 - Christos Tsigkanos

, Liliana Pasquale, Carlo Ghezzi, Bashar Nuseibeh
:
On the Interplay Between Cyber and Physical Spaces for Adaptive Security. 466-480 - Dan Bogdanov

, Liina Kamm
, Sven Laur, Ville Sokk:
Rmind: A Tool for Cryptographically Secure Statistical Analysis. 481-495 - Qian Wang

, Meiqi He, Minxin Du
, Sherman S. M. Chow
, Russell W. F. Lai, Qin Zou
:
Searchable Encryption over Feature-Rich Data. 496-510 - Miguel Garcia

, Nuno Neves, Alysson Bessani
:
SieveQ: A Layered BFT Protection System for Critical Services. 511-525 - Fathiyeh Faghih, Borzoo Bonakdarpour

:
Symbolic Synthesis of Timed Models with Strict 2-Phase Fault Recovery. 526-541 - Limei Lin

, Li Xu, Dajin Wang, Shuming Zhou:
The g-Good-Neighbor Conditional Diagnosability of Arrangement Graphs. 542-548
Volume 15, Number 4, July - August 2018
- Meikang Qiu, Yang Xiang

, Yan Zhang:
Guest Editor's Introduction to the Special Section on Social Network Security. 549-550 - Muhammad Usman Shahid Khan

, Mazhar Ali
, Assad Abbas
, Samee U. Khan
, Albert Y. Zomaya
:
Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter. 551-560 - Stefano Cresci

, Roberto Di Pietro
, Marinella Petrocchi, Angelo Spognardi
, Maurizio Tesconi:
Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling. 561-576 - Zhipeng Cai

, Zaobo He, Xin Guan, Yingshu Li
:
Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks. 577-590 - Qian Wang

, Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin
, Kui Ren:
Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy. 591-606 - Kuan Zhang

, Xiaohui Liang
, Jianbing Ni
, Kan Yang
, Xuemin Sherman Shen
:
Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage. 607-620 - Meriem Guerar

, Mauro Migliardi
, Alessio Merlo
, Mohamed Benmohammed, Francesco Palmieri
, Aniello Castiglione
:
Using Screen Brightness to Improve Security in Mobile Social Network Access. 621-632 - Debiao He

, Neeraj Kumar
, Huaqun Wang, Lina Wang, Kim-Kwang Raymond Choo
, Alexey V. Vinel
:
A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network. 633-645 - Huaxin Li

, Haojin Zhu
, Suguo Du, Xiaohui Liang
, Xuemin Sherman Shen
:
Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense. 646-660 - Majed A. AlRubaian, Muhammad Al-Qurishi, Mohammad Mehedi Hassan

, Atif Alamri:
A Credibility Analysis System for Assessing Information on Twitter. 661-674 - Pengfei Chen

, Yong Qi, Xinyi Li, Di Hou, Michael Rung-Tsong Lyu:
ARF-Predictor: Effective Prediction of Aging-Related Failure Using Entropy. 675-693 - Jan Stanek

, Lukas Kencl
:
Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage. 694-707 - Ding Wang

, Ping Wang
:
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound. 708-722 - Masahiro Kaminaga, Hideki Yoshikawa, Arimitsu Shikoda

, Toshinori Suzuki:
Crashing Modulus Attack on Modular Squaring for Rabin Cryptosystem. 723-728
Volume 15, Number 5, September - October 2018
- Anastasios N. Bikos

, Nicolas Sklavos
:
Architecture Design of an Area Efficient High Speed Crypto Processor for 4G LTE. 729-741 - Le Guan, Jingqiang Lin

, Ziqiang Ma, Bo Luo
, Luning Xia, Jiwu Jing:
Copker: A Cryptographic Engine Against Cold-Boot Attacks. 742-754 - Alireza Shameli-Sendi

, Habib Louafi, Wenbo He
, Mohamed Cheriet
:
Dynamic Optimal Countermeasure Selection for Intrusion Response System. 755-770 - Suchul Lee

, Sungho Kim, Sungil Lee, Jaehyuk Choi
, Hanjun Yoon, Dohoon Lee, Jun-Rak Lee:
LARGen: Automatic Signature Generation for Malwares Using Latent Dirichlet Allocation. 771-783 - Qiang Tang

, Jun Wang:
Privacy-Preserving Friendship-Based Recommender Systems. 784-796 - Jin Soo Jang

, Changho Choi
, Jae-Hyuk Lee, Nohyun Kwak, Seongman Lee, Yeseul Choi, Brent ByungHoon Kang:
PrivateZone: Providing a Private Execution Environment Using ARM TrustZone. 797-810 - Daniel Sun

, Alan D. Fekete, Vincent Gramoli, Guoqiang Li, Xiwei Xu
, Liming Zhu
:
R2C: Robust Rolling-Upgrade in Clouds. 811-823 - Santanu Chatterjee, Sandip Roy, Ashok Kumar Das

, Samiran Chattopadhyay
, Neeraj Kumar
, Athanasios V. Vasilakos
:
Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment. 824-839 - Nurzhan Zhumabekuly Aitzhan, Davor Svetinovic

:
Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams. 840-852 - Tao Wang

, Yao Liu, Tao Hou, Qingqi Pei, Song Fang:
Signal Entanglement Based Pinpoint Waveforming for Location-Restricted Service Access Control. 853-867 - Xingliang Yuan

, Xinyu Wang
, Cong Wang
, Anna Cinzia Squicciarini, Kui Ren:
Towards Privacy-Preserving and Practical Image-Centric Social Discovery. 868-882 - Jianting Ning

, Zhenfu Cao
, Xiaolei Dong, Lifei Wei:
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively. 883-897 - Ruben Lumbiarres-Lopez

, Mariano López-García
, Enrique F. Cantó-Navarro
:
Hardware Architecture Implemented on FPGA for Protecting Cryptographic Keys against Side-Channel Attacks. 898-905 - Xingxin Li, Youwen Zhu

, Jian Wang, Zhe Liu, Yining Liu, Mingwu Zhang:
On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification. 906-912
Volume 15, Number 6, November - December 2018
- Domenico Cotroneo

, Karthik Pattabiraman
, Antonio Pecchia:
Guest Editors' Introduction: Special Issue on Data-Driven Dependability and Security. 913-914 - Saurabh Jha

, Valerio Formicola
, Catello Di Martino, Mark Dalton
, William T. Kramer, Zbigniew Kalbarczyk, Ravishankar K. Iyer
:
Resiliency of HPC Interconnects: A Case Study of Interconnect Failures and Recovery in Blue Waters. 915-930 - Pinjia He

, Jieming Zhu
, Shilin He, Jian Li, Michael R. Lyu:
Towards Automated Log Parsing for Large-Scale Log Data Analysis. 931-944 - Oliver Schwahn

, Stefan Winter
, Nicolas Coppik
, Neeraj Suri
:
How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code. 945-958 - Gaurav Somani

, Manoj Singh Gaur
, Dheeraj Sanghi, Mauro Conti
, Muttukrishnan Rajarajan:
Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks. 959-973 - Santosh Aditham

, Nagarajan Ranganathan:
A System Architecture for the Detection of Insider Attacks in Big Data Systems. 974-987 - Christopher N. Gutierrez

, Taegyu Kim, Raffaele Della Corte
, Jeffrey Avery, Dan Goldwasser, Marcello Cinque
, Saurabh Bagchi
:
Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks. 988-1001 - Pontus Johnson, Robert Lagerström

, Mathias Ekstedt, Ulrik Franke
:
Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis. 1002-1015 - Bo Liu

, Wanlei Zhou
, Longxiang Gao
, Haibo Zhou
, Tom H. Luan
, Sheng Wen:
Malware Propagations in Wireless Ad Hoc Networks. 1016-1026 - Boyang Wang

, Xinxin Fan:
Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data. 1027-1040 - Jun Young Kim

, Wen Hu
, Hossein Shafagh, Sanjay Jha
:
SEDA: Secure Over-the-Air Code Dissemination Protocol for the Internet of Things. 1041-1054 - Zhenxing Qian

, Hang Zhou, Xinpeng Zhang
, Weiming Zhang
:
Separable Reversible Data Hiding in Encrypted JPEG Bitstreams. 1055-1067 - Jinxue Zhang

, Rui Zhang
, Yanchao Zhang
, Guanhua Yan
:
The Rise of Social Botnets: Attacks and Countermeasures. 1068-1082 - Zhiguo Wan

, Robert H. Deng
:
VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data. 1083-1095

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














