


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 7
Volume 7, Number 1, January-March 2010
- Virgil D. Gligor:

Editorial. 1-3 - Ravi S. Sandhu:

Editorial. 4 - Mehran S. Fallah:

A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory. 5-19 - Steffen Peter, Dirk Westhoff, Claude Castelluccia:

A Survey on the Encryption of Convergecast Traffic with In-Network Processing. 20-34 - Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao

:
Layered Approach Using Conditional Random Fields for Intrusion Detection. 35-49 - Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thuraisingham, Latifur Khan

:
Secure Data Objects Replication in Data Grid. 50-64 - Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu:

SigFree: A Signature-Free Buffer Overflow Attack Blocker. 65-79 - Yair Amir, Claudiu Danilov, Danny Dolev

, Jonathan Kirsch, John Lane, Cristina Nita-Rotaru, Josh Olsen, David Zage:
Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks. 80-93 - Avi Timor, Avi Mendelson, Yitzhak Birk

, Neeraj Suri
:
Using Underutilized CPU Resources to Enhance Its Reliability. 94-109
Volume 7, Number 2, April - June 2010
- Ping Wang, Sherri Sparks, Cliff Changchun Zou:

An Advanced Hybrid Peer-to-Peer Botnet. 113-127 - Hichem Boudali, Pepijn Crouzen, Mariëlle Stoelinga

:
A Rigorous, Compositional, and Extensible Framework for Dynamic Fault Tree Analysis. 128-143 - Ammar Masood, Arif Ghafoor, Aditya P. Mathur:

Conformance Testing of Temporal Role-Based Access Control Systems. 144-158 - Lei Gao, Michael Dahlin, Jiandan Zheng, Lorenzo Alvisi, Arun Iyengar:

Dual-Quorum: A Highly Available and Consistent Replication System for Edge Services. 159-174 - Tzu-Fang Sheu, Nen-Fu Huang, Hsiao Ping Lee:

In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm. 175-188 - Yanjiang Yang, Yingjiu Li, Robert H. Deng

, Feng Bao:
Shifting Inference Control to User Side: Architecture and Protocol. 189-202 - XiaoFeng Wang, Michael K. Reiter:

Using Web-Referral Architectures to Mitigate Denial-of-Service Threats. 203-216 - Joonho Kong, Johnsy K. John, Eui-Young Chung, Sung Woo Chung, Jie S. Hu:

On the Thermal Attack in Instruction Caches. 217-223
Volume 7, Number 3, July - September 2010
- Ravi S. Sandhu:

Editorial. 225 - Massimo Alioto, Massimo Poli, Santina Rocchi

:
Differential Power Analysis Attacks to Precharged Buses: A General Analysis for Symmetric-Key Cryptographic Algorithms. 226-239 - Chrysostomos Nicopoulos

, Suresh Srinivasan, Aditya Yanamandra, Dongkook Park, Vijaykrishnan Narayanan, Chita R. Das, Mary Jane Irwin:
On the Effects of Process Variation in Network-on-Chip Architectures. 240-254 - Stephen W. Boyd, Gaurav S. Kc, Michael E. Locasto, Angelos D. Keromytis, Vassilis Prevelakis:

On the General Applicability of Instruction-Set Randomization. 255-270 - Tiejun Ma, Jane Hillston, Stuart Anderson

:
On the Quality of Service of Crash-Recovery Failure Detectors. 271-283 - Fei Xing, Wenye Wang

:
On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures. 284-299 - Jaideep Vaidya, Vijayalakshmi Atluri

, Janice Warner, Qi Guo:
Role Engineering via Prioritized Subset Enumeration. 300-314 - G. Robert Redinbo:

Wavelet Codes for Algorithm-Based Fault Tolerance Applications. 315-328 - Neeraj Mittal, Ramon Novales:

Cluster-Based Key Predistribution Using Deployment Knowledge. 329-335
Volume 7, Number 4, October - December 2010
- Bianca Schroeder, Garth A. Gibson

:
A Large-Scale Study of Failures in High-Performance Computing Systems. 337-351 - Ryan D. Riley

, Xuxian Jiang, Dongyan Xu:
An Architectural Approach to Preventing Code Injection Attacks. 351-365 - Shravan Gaonkar, Kimberly Keeton

, Arif Merchant
, William H. Sanders:
Designing Dependable Storage Solutions for Shared Application Environments. 366-380 - Federico Maggi

, Matteo Matteucci, Stefano Zanero
:
Detecting Intrusions through System Call Sequence and Argument Analysis. 381-395 - Ramana Rao Kompella, Jennifer Yates, Albert G. Greenberg, Alex C. Snoeren:

Fault Localization via Risk Modeling. 396-409 - Mi Kyung Han, Lili Qiu:

Greedy Receivers in IEEE 802.11 Hotspots: Impacts and Detection. 410-423 - Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:

Proactive Detection of Computer Worms Using Model Checking. 424-438 - Paolo Bernardi

, Letícia Maria Veiras Bolzani Poehls, Michelangelo Grosso
, Matteo Sonza Reorda
:
A Hybrid Approach for Detection and Correction of Transient Faults in SoCs. 439-445

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














