Journal: IEEE Trans. Dependable Sec. Comput.

Volume 1, Issue 4

193 -- 208Haining Wang, Danlu Zhang, Kang G. Shin. Change-Point Monitoring for the Detection of DoS Attacks
209 -- 222Bryan Parno, Mema Roussopoulos. Defending a P2P Digital Preservation System
223 -- 237Andrea Bondavalli, Silvano Chiaradonna, Domenico Cotroneo, Luigi Romano. Effective Fault Treatment for Improving the Dependability of COTS and Legacy-Based Applications
238 -- 254Vijayalakshmi Atluri, Soon Ae Chun. An Authorization Model for Geospatial Data

Volume 1, Issue 3

146 -- 169Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer. A Comprehensive Approach to Intrusion Detection Alert Correlation
170 -- 178Xun Yi. Identity-Based Fault-Tolerant Conference Key Agreement
179 -- 189Girish B. Ratanpal, Ronald D. Williams, Travis N. Blalock. An On-Chip Signal Suppression Countermeasure to Power Analysis Attacks

Volume 1, Issue 2

97 -- 108E. N. Elnozahy, James S. Plank. Checkpointing for Peta-Scale Systems: A Look into the Future of Practical Rollback-Recovery
109 -- 127Daniel P. Siewiorek, Ram Chillarege, Zbigniew Kalbarczyk. Reflections on Industry Trends and Experimental Research in Dependability
128 -- 143Tanay Karnik, Peter Hazucha, Jagdish Patel. Characterization of Soft Errors Caused by Single Event Upsets in CMOS Processes

Volume 1, Issue 1

11 -- 33Algirdas Avizienis, Jean-Claude Laprie, Brian Randell, Carl E. Landwehr. Basic Concepts and Taxonomy of Dependable and Secure Computing
34 -- 47Michael A. Marsh, Fred B. Schneider. CODEX: A Robust and Secure Secret Distribution System
48 -- 65David M. Nicol, William H. Sanders, Kishor S. Trivedi. Model-Based Evaluation: From Dependability to Security
66 -- 86Nancy G. Leveson. A Systems-Theoretic Approach to Safety in Software-Intensive Systems
87 -- 96Wendy Bartlett, Lisa Spainhower. Commercial Fault Tolerance: A Tale of Two Systems