default search action
IEEE Transactions on Dependable and Secure Computing, Volume 7
Volume 7, Number 1, January-March 2010
- Virgil D. Gligor:
Editorial. 1-3 - Ravi S. Sandhu:
Editorial. 4 - Mehran S. Fallah:
A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory. 5-19 - Steffen Peter, Dirk Westhoff, Claude Castelluccia:
A Survey on the Encryption of Convergecast Traffic with In-Network Processing. 20-34 - Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao:
Layered Approach Using Conditional Random Fields for Intrusion Detection. 35-49 - Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thuraisingham, Latifur Khan:
Secure Data Objects Replication in Data Grid. 50-64 - Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu:
SigFree: A Signature-Free Buffer Overflow Attack Blocker. 65-79 - Yair Amir, Claudiu Danilov, Danny Dolev, Jonathan Kirsch, John Lane, Cristina Nita-Rotaru, Josh Olsen, David Zage:
Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks. 80-93 - Avi Timor, Avi Mendelson, Yitzhak Birk, Neeraj Suri:
Using Underutilized CPU Resources to Enhance Its Reliability. 94-109
Volume 7, Number 2, April - June 2010
- Ping Wang, Sherri Sparks, Cliff Changchun Zou:
An Advanced Hybrid Peer-to-Peer Botnet. 113-127 - Hichem Boudali, Pepijn Crouzen, Mariëlle Stoelinga:
A Rigorous, Compositional, and Extensible Framework for Dynamic Fault Tree Analysis. 128-143 - Ammar Masood, Arif Ghafoor, Aditya P. Mathur:
Conformance Testing of Temporal Role-Based Access Control Systems. 144-158 - Lei Gao, Michael Dahlin, Jiandan Zheng, Lorenzo Alvisi, Arun Iyengar:
Dual-Quorum: A Highly Available and Consistent Replication System for Edge Services. 159-174 - Tzu-Fang Sheu, Nen-Fu Huang, Hsiao Ping Lee:
In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm. 175-188 - Yanjiang Yang, Yingjiu Li, Robert H. Deng, Feng Bao:
Shifting Inference Control to User Side: Architecture and Protocol. 189-202 - XiaoFeng Wang, Michael K. Reiter:
Using Web-Referral Architectures to Mitigate Denial-of-Service Threats. 203-216 - Joonho Kong, Johnsy K. John, Eui-Young Chung, Sung Woo Chung, Jie S. Hu:
On the Thermal Attack in Instruction Caches. 217-223
Volume 7, Number 3, July - September 2010
- Ravi S. Sandhu:
Editorial. 225 - Massimo Alioto, Massimo Poli, Santina Rocchi:
Differential Power Analysis Attacks to Precharged Buses: A General Analysis for Symmetric-Key Cryptographic Algorithms. 226-239 - Chrysostomos Nicopoulos, Suresh Srinivasan, Aditya Yanamandra, Dongkook Park, Vijaykrishnan Narayanan, Chita R. Das, Mary Jane Irwin:
On the Effects of Process Variation in Network-on-Chip Architectures. 240-254 - Stephen W. Boyd, Gaurav S. Kc, Michael E. Locasto, Angelos D. Keromytis, Vassilis Prevelakis:
On the General Applicability of Instruction-Set Randomization. 255-270 - Tiejun Ma, Jane Hillston, Stuart Anderson:
On the Quality of Service of Crash-Recovery Failure Detectors. 271-283 - Fei Xing, Wenye Wang:
On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures. 284-299 - Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner, Qi Guo:
Role Engineering via Prioritized Subset Enumeration. 300-314 - G. Robert Redinbo:
Wavelet Codes for Algorithm-Based Fault Tolerance Applications. 315-328 - Neeraj Mittal, Ramon Novales:
Cluster-Based Key Predistribution Using Deployment Knowledge. 329-335
Volume 7, Number 4, October - December 2010
- Bianca Schroeder, Garth A. Gibson:
A Large-Scale Study of Failures in High-Performance Computing Systems. 337-351 - Ryan D. Riley, Xuxian Jiang, Dongyan Xu:
An Architectural Approach to Preventing Code Injection Attacks. 351-365 - Shravan Gaonkar, Kimberly Keeton, Arif Merchant, William H. Sanders:
Designing Dependable Storage Solutions for Shared Application Environments. 366-380 - Federico Maggi, Matteo Matteucci, Stefano Zanero:
Detecting Intrusions through System Call Sequence and Argument Analysis. 381-395 - Ramana Rao Kompella, Jennifer Yates, Albert G. Greenberg, Alex C. Snoeren:
Fault Localization via Risk Modeling. 396-409 - Mi Kyung Han, Lili Qiu:
Greedy Receivers in IEEE 802.11 Hotspots: Impacts and Detection. 410-423 - Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Proactive Detection of Computer Worms Using Model Checking. 424-438 - Paolo Bernardi, Letícia Maria Veiras Bolzani Poehls, Michelangelo Grosso, Matteo Sonza Reorda:
A Hybrid Approach for Detection and Correction of Transient Faults in SoCs. 439-445
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.