callback( { "result":{ "query":":facetid:toc:\"db/journals/tdsc/tdsc3.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"63.85" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"32", "@dc":"32", "@oc":"32", "@id":"43473986", "text":":facetid:toc:db/journals/tdsc/tdsc3.bht" } }, "hits":{ "@total":"32", "@computed":"32", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"5685204", "info":{"authors":{"author":[{"@pid":"03/3592","text":"Jean Arlat"},{"@pid":"31/4416","text":"Andrea Bondavalli"},{"@pid":"h/BRHaverkort","text":"Boudewijn R. Haverkort"},{"@pid":"v/PauloVerissimo","text":"Paulo Veríssimo"}]},"title":"Guest Editorial for the Special Issue on the 2005 IEEE/IFIP Conference on Dependable Systems and Networks, including the Dependable Computing and Communications and Performance and Dependability Symposia.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"3","pages":"169-171","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/ArlatBHV06","doi":"10.1109/TDSC.2006.36","ee":"https://doi.org/10.1109/TDSC.2006.36","url":"https://dblp.org/rec/journals/tdsc/ArlatBHV06"}, "url":"URL#5685204" }, { "@score":"1", "@id":"5685205", "info":{"authors":{"author":[{"@pid":"16/3698","text":"Gal Badishi"},{"@pid":"k/IditKeidar","text":"Idit Keidar"},{"@pid":"92/2490","text":"Amir Sasson"}]},"title":"Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based Multicast.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"1","pages":"45-61","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/BadishiKS06","doi":"10.1109/TDSC.2006.12","ee":"https://doi.org/10.1109/TDSC.2006.12","url":"https://dblp.org/rec/journals/tdsc/BadishiKS06"}, "url":"URL#5685205" }, { "@score":"1", "@id":"5685206", "info":{"authors":{"author":[{"@pid":"15/1148","text":"Zachary K. Baker"},{"@pid":"p/ViktorKPrasanna","text":"Viktor K. Prasanna"}]},"title":"Automatic Synthesis of Efficient Intrusion Detection Systems on FPGAs.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"4","pages":"289-300","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/BakerP06","doi":"10.1109/TDSC.2006.44","ee":"https://doi.org/10.1109/TDSC.2006.44","url":"https://dblp.org/rec/journals/tdsc/BakerP06"}, "url":"URL#5685206" }, { "@score":"1", "@id":"5685207", "info":{"authors":{"author":[{"@pid":"37/6845","text":"Angelo Ciaramella"},{"@pid":"93/1489","text":"Paolo D'Arco"},{"@pid":"19/4614","text":"Alfredo De Santis"},{"@pid":"64/6932","text":"Clemente Galdi"},{"@pid":"69/6674","text":"Roberto Tagliaferri"}]},"title":"Neural Network Techniques for Proactive Password Checking.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"4","pages":"327-339","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/CiaramellaDSGT06","doi":"10.1109/TDSC.2006.53","ee":"https://doi.org/10.1109/TDSC.2006.53","url":"https://dblp.org/rec/journals/tdsc/CiaramellaDSGT06"}, "url":"URL#5685207" }, { "@score":"1", "@id":"5685208", "info":{"authors":{"author":[{"@pid":"d/WenliangDu","text":"Wenliang Du"},{"@pid":"06/6599-1","text":"Jing Deng 0001"},{"@pid":"74/5823","text":"Yunghsiang S. Han"},{"@pid":"v/PKVarshney","text":"Pramod K. Varshney"}]},"title":"A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"1","pages":"62-77","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/DuDHV06","doi":"10.1109/TDSC.2006.2","ee":"https://doi.org/10.1109/TDSC.2006.2","url":"https://dblp.org/rec/journals/tdsc/DuDHV06"}, "url":"URL#5685208" }, { "@score":"1", "@id":"5685209", "info":{"authors":{"author":[{"@pid":"94/4742","text":"Anthony Y. Fu"},{"@pid":"l/WenyinLiu","text":"Liu Wenyin"},{"@pid":"d/XiaotieDeng","text":"Xiaotie Deng"}]},"title":"Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD).","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"4","pages":"301-311","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/FuWD06","doi":"10.1109/TDSC.2006.50","ee":"https://doi.org/10.1109/TDSC.2006.50","url":"https://dblp.org/rec/journals/tdsc/FuWD06"}, "url":"URL#5685209" }, { "@score":"1", "@id":"5685210", "info":{"authors":{"author":[{"@pid":"27/4719","text":"Junghee Han"},{"@pid":"37/4165-1","text":"David Watson 0001"},{"@pid":"90/6277","text":"Farnam Jahanian"}]},"title":"An Experimental Study of Internet Path Diversity.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"4","pages":"273-288","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/HanWJ06","doi":"10.1109/TDSC.2006.43","ee":"https://doi.org/10.1109/TDSC.2006.43","url":"https://dblp.org/rec/journals/tdsc/HanWJ06"}, "url":"URL#5685210" }, { "@score":"1", "@id":"5685211", "info":{"authors":{"author":{"@pid":"i/RavishankarKIyer","text":"Ravishankar K. Iyer"}},"title":"Editorial: Dependability and Security--Looking Foward to 2006.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"1","pages":"1","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/Iyer06","doi":"10.1109/TDSC.2006.11","ee":"https://doi.org/10.1109/TDSC.2006.11","url":"https://dblp.org/rec/journals/tdsc/Iyer06"}, "url":"URL#5685211" }, { "@score":"1", "@id":"5685212", "info":{"authors":{"author":[{"@pid":"47/4422","text":"Guofei Jiang"},{"@pid":"08/57","text":"Haifeng Chen"},{"@pid":"38/467","text":"Kenji Yoshihira"}]},"title":"Modeling and Tracking of Transaction Flow Dynamics for Fault Detection in Complex Systems.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"4","pages":"312-326","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/JiangCY06","doi":"10.1109/TDSC.2006.52","ee":"https://doi.org/10.1109/TDSC.2006.52","url":"https://dblp.org/rec/journals/tdsc/JiangCY06"}, "url":"URL#5685212" }, { "@score":"1", "@id":"5685213", "info":{"authors":{"author":[{"@pid":"04/2138","text":"Peter Kemper"},{"@pid":"92/2576-3","text":"Dennis Müller 0003"},{"@pid":"51/1036","text":"Axel Thümmler"}]},"title":"Combining Response Surface Methodology with Numerical Methods for Optimization of Markovian Models.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"3","pages":"259-269","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/KemperMT06","doi":"10.1109/TDSC.2006.28","ee":"https://doi.org/10.1109/TDSC.2006.28","url":"https://dblp.org/rec/journals/tdsc/KemperMT06"}, "url":"URL#5685213" }, { "@score":"1", "@id":"5685214", "info":{"authors":{"author":[{"@pid":"42/4986","text":"Gunjan Khanna"},{"@pid":"51/3308","text":"Padma Varadharajan"},{"@pid":"57/95","text":"Saurabh Bagchi"}]},"title":"Automated Online Monitoring of Distributed Applications through External Monitors.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"2","pages":"115-129","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/KhannaVB06","doi":"10.1109/TDSC.2006.17","ee":"https://doi.org/10.1109/TDSC.2006.17","url":"https://dblp.org/rec/journals/tdsc/KhannaVB06"}, "url":"URL#5685214" }, { "@score":"1", "@id":"5685215", "info":{"authors":{"author":[{"@pid":"27/5793","text":"Yoohwan Kim"},{"@pid":"l/WingCheongLau","text":"Wing Cheong Lau"},{"@pid":"23/5033","text":"Mooi Choo Chuah"},{"@pid":"48/1215","text":"H. Jonathan Chao"}]},"title":"PacketScore: A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"2","pages":"141-155","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/KimLCC06","doi":"10.1109/TDSC.2006.25","ee":"https://doi.org/10.1109/TDSC.2006.25","url":"https://dblp.org/rec/journals/tdsc/KimLCC06"}, "url":"URL#5685215" }, { "@score":"1", "@id":"5685216", "info":{"authors":{"author":[{"@pid":"62/6011-1","text":"Jiangtao Li 0001"},{"@pid":"l/NinghuiLi","text":"Ninghui Li"}]},"title":"OACerts: Oblivious Attribute Certificates.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"4","pages":"340-352","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/LiL06","doi":"10.1109/TDSC.2006.54","ee":"https://doi.org/10.1109/TDSC.2006.54","url":"https://dblp.org/rec/journals/tdsc/LiL06"}, "url":"URL#5685216" }, { "@score":"1", "@id":"5685217", "info":{"authors":{"author":[{"@pid":"99/1869","text":"Jean-Philippe Martin"},{"@pid":"a/LAlvisi","text":"Lorenzo Alvisi"}]},"title":"Fast Byzantine Consensus.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"3","pages":"202-215","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/MartinA06","doi":"10.1109/TDSC.2006.35","ee":"https://doi.org/10.1109/TDSC.2006.35","url":"https://dblp.org/rec/journals/tdsc/MartinA06"}, "url":"URL#5685217" }, { "@score":"1", "@id":"5685218", "info":{"authors":{"author":[{"@pid":"99/1869","text":"Jean-Philippe Martin"},{"@pid":"a/LAlvisi","text":"Lorenzo Alvisi"}]},"title":"Correction to "Fast Byzantine Consensus".","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"4","pages":"400","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/MartinA06a","doi":"10.1109/TDSC.2006.45","ee":"https://doi.org/10.1109/TDSC.2006.45","url":"https://dblp.org/rec/journals/tdsc/MartinA06a"}, "url":"URL#5685218" }, { "@score":"1", "@id":"5685219", "info":{"authors":{"author":[{"@pid":"m/ATMizrak","text":"Alper Tugay Mizrak"},{"@pid":"85/8634","text":"Yuchung Cheng"},{"@pid":"m/KMarzullo","text":"Keith Marzullo"},{"@pid":"s/StefanSavage","text":"Stefan Savage"}]},"title":"Detecting and Isolating Malicious Routers.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"3","pages":"230-244","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/MizrakCMS06","doi":"10.1109/TDSC.2006.34","ee":"https://doi.org/10.1109/TDSC.2006.34","url":"https://dblp.org/rec/journals/tdsc/MizrakCMS06"}, "url":"URL#5685219" }, { "@score":"1", "@id":"5685220", "info":{"authors":{"author":[{"@pid":"21/3636","text":"Danny Nebenzahl"},{"@pid":"s/SSagiv","text":"Shmuel Sagiv"},{"@pid":"w/AvishaiWool","text":"Avishai Wool"}]},"title":"Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"1","pages":"78-90","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/NebenzahlSW06","doi":"10.1109/TDSC.2006.14","ee":"https://doi.org/10.1109/TDSC.2006.14","url":"https://dblp.org/rec/journals/tdsc/NebenzahlSW06"}, "url":"URL#5685220" }, { "@score":"1", "@id":"5685221", "info":{"authors":{"author":[{"@pid":"79/5354","text":"Tatsuya Ozaki"},{"@pid":"38/997","text":"Tadashi Dohi"},{"@pid":"85/3171","text":"Hiroyuki Okamura"},{"@pid":"20/2416","text":"Naoto Kaio"}]},"title":"Distribution-Free Checkpoint Placement Algorithms Based on Min-Max Principle.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"2","pages":"130-140","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/OzakiDOK06","doi":"10.1109/TDSC.2006.22","ee":"https://doi.org/10.1109/TDSC.2006.22","url":"https://dblp.org/rec/journals/tdsc/OzakiDOK06"}, "url":"URL#5685221" }, { "@score":"1", "@id":"5685222", "info":{"authors":{"author":[{"@pid":"09/6651","text":"Anil L. Pereira"},{"@pid":"20/6244","text":"Vineela Muppavarapu"},{"@pid":"c/SoonMyoungChung","text":"Soon Myoung Chung"}]},"title":"Role-Based Access Control for Grid Database Services Using the Community Authorization Service.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"2","pages":"156-166","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/PereiraMC06","doi":"10.1109/TDSC.2006.26","ee":"https://doi.org/10.1109/TDSC.2006.26","url":"https://dblp.org/rec/journals/tdsc/PereiraMC06"}, "url":"URL#5685222" }, { "@score":"1", "@id":"5685223", "info":{"authors":{"author":[{"@pid":"50/2948","text":"Krerk Piromsopa"},{"@pid":"e/RJEnbody","text":"Richard J. Enbody"}]},"title":"Secure Bit: Transparent, Hardware Buffer-Overflow Protection.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"4","pages":"365-376","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/PiromsopaE06","doi":"10.1109/TDSC.2006.56","ee":"https://doi.org/10.1109/TDSC.2006.56","url":"https://dblp.org/rec/journals/tdsc/PiromsopaE06"}, "url":"URL#5685223" }, { "@score":"1", "@id":"5685224", "info":{"authors":{"author":[{"@pid":"78/6954","text":"Mohan Rajagopalan"},{"@pid":"34/1306","text":"Matti A. Hiltunen"},{"@pid":"21/2627","text":"Trevor Jim"},{"@pid":"s/RichardDSchlichting","text":"Richard D. Schlichting"}]},"title":"System Call Monitoring Using Authenticated System Calls.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"3","pages":"216-229","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/RajagopalanHJS06","doi":"10.1109/TDSC.2006.41","ee":"https://doi.org/10.1109/TDSC.2006.41","url":"https://dblp.org/rec/journals/tdsc/RajagopalanHJS06"}, "url":"URL#5685224" }, { "@score":"1", "@id":"5685225", "info":{"authors":{"author":[{"@pid":"s/AndreSchiper","text":"André Schiper"},{"@pid":"t/SamToueg","text":"Sam Toueg"}]},"title":"From Set Membership to Group Membership: A Separation of Concerns.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"1","pages":"2-12","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/SchiperT06","doi":"10.1109/TDSC.2006.13","ee":"https://doi.org/10.1109/TDSC.2006.13","url":"https://dblp.org/rec/journals/tdsc/SchiperT06"}, "url":"URL#5685225" }, { "@score":"1", "@id":"5685226", "info":{"authors":{"author":[{"@pid":"s/AnnaCinziaSquicciarini","text":"Anna Cinzia Squicciarini"},{"@pid":"b/ElisaBertino","text":"Elisa Bertino"},{"@pid":"f/ElenaFerrari","text":"Elena Ferrari"},{"@pid":"r/IndrakshiRay","text":"Indrakshi Ray"}]},"title":"Achieving Privacy in Trust Negotiations with an Ontology-Based Approach.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"1","pages":"13-30","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/SquicciariniBFR06","doi":"10.1109/TDSC.2006.3","ee":"https://doi.org/10.1109/TDSC.2006.3","url":"https://dblp.org/rec/journals/tdsc/SquicciariniBFR06"}, "url":"URL#5685226" }, { "@score":"1", "@id":"5685227", "info":{"authors":{"author":[{"@pid":"40/5734","text":"Vilas Sridharan"},{"@pid":"a/GAsadi","text":"Hossein Asadi 0001"},{"@pid":"55/3589","text":"Mehdi Baradaran Tahoori"},{"@pid":"k/DavidRKaeli","text":"David R. Kaeli"}]},"title":"Reducing Data Cache Susceptibility to Soft Errors.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"4","pages":"353-364","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/SridharanATK06","doi":"10.1109/TDSC.2006.55","ee":"https://doi.org/10.1109/TDSC.2006.55","url":"https://dblp.org/rec/journals/tdsc/SridharanATK06"}, "url":"URL#5685227" }, { "@score":"1", "@id":"5685228", "info":{"authors":{"author":[{"@pid":"66/4695","text":"Elisabeth A. Strunk"},{"@pid":"87/4375","text":"John C. Knight"}]},"title":"Dependability through Assured Reconfiguration in Embedded System Software.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"3","pages":"172-187","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/StrunkK06","doi":"10.1109/TDSC.2006.33","ee":"https://doi.org/10.1109/TDSC.2006.33","url":"https://dblp.org/rec/journals/tdsc/StrunkK06"}, "url":"URL#5685228" }, { "@score":"1", "@id":"5685229", "info":{"authors":{"author":[{"@pid":"51/1036","text":"Axel Thümmler"},{"@pid":"b/PeterBuchholz","text":"Peter Buchholz 0001"},{"@pid":"51/1636","text":"Miklós Telek"}]},"title":"A Novel Approach for Phase-Type Fitting with the EM Algorithm.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"3","pages":"245-258","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/ThummlerBT06","doi":"10.1109/TDSC.2006.27","ee":"https://doi.org/10.1109/TDSC.2006.27","url":"https://dblp.org/rec/journals/tdsc/ThummlerBT06"}, "url":"URL#5685229" }, { "@score":"1", "@id":"5685230", "info":{"authors":{"author":[{"@pid":"00/1290","text":"Adnan Vora"},{"@pid":"34/5032","text":"Mikhail Nesterenko"}]},"title":"Secure Location Verification Using Radio Broadcast.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"4","pages":"377-385","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/VoraN06","doi":"10.1109/TDSC.2006.57","ee":"https://doi.org/10.1109/TDSC.2006.57","url":"https://dblp.org/rec/journals/tdsc/VoraN06"}, "url":"URL#5685230" }, { "@score":"1", "@id":"5685231", "info":{"authors":{"author":[{"@pid":"92/6767","text":"Shyh-Yih Wang"},{"@pid":"48/6439","text":"Chi-Sung Laih"}]},"title":"Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"1","pages":"91-100","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/WangL06","doi":"10.1109/TDSC.2006.15","ee":"https://doi.org/10.1109/TDSC.2006.15","url":"https://dblp.org/rec/journals/tdsc/WangL06"}, "url":"URL#5685231" }, { "@score":"1", "@id":"5685232", "info":{"authors":{"author":[{"@pid":"38/1423","text":"Nicholas J. Wang"},{"@pid":"05/6203","text":"Sanjay J. Patel"}]},"title":"ReStore: Symptom-Based Soft Error Detection in Microprocessors.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"3","pages":"188-201","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/WangP06","doi":"10.1109/TDSC.2006.40","ee":"https://doi.org/10.1109/TDSC.2006.40","url":"https://dblp.org/rec/journals/tdsc/WangP06"}, "url":"URL#5685232" }, { "@score":"1", "@id":"5685233", "info":{"authors":{"author":[{"@pid":"11/159","text":"Konstantinos Xinidis"},{"@pid":"79/5231","text":"Ioannis Charitakis"},{"@pid":"85/6704","text":"Spyros Antonatos"},{"@pid":"60/7008","text":"Kostas G. Anagnostakis"},{"@pid":"m/EvangelosPMarkatos","text":"Evangelos P. Markatos"}]},"title":"An Active Splitter Architecture for Intrusion Detection and Prevention.","venue":"IEEE Trans. Dependable Secur. Comput.","volume":"3","number":"1","pages":"31-44","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tdsc/XinidisCAAM06","doi":"10.1109/TDSC.2006.6","ee":"https://doi.org/10.1109/TDSC.2006.6","url":"https://dblp.org/rec/journals/tdsc/XinidisCAAM06"}, "url":"URL#5685233" } ] } } } )