Journal: IEEE Trans. Dependable Sec. Comput.

Volume 11, Issue 6

497 -- 509Lotfi Ben Othmane, Pelin Angin, Harold Weffers, Bharat K. Bhargava. Extending the Agile Development Process to Develop Acceptably Secure Software
510 -- 523Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati. Fragmentation in Presence of Data Dependencies
524 -- 537Jianzhong Huang, Xiao Qin, Fenghao Zhang, Wei-Shinn Ku, Changsheng Xie. MFTS: A Multi-Level Fault-Tolerant Archiving Storage with Optimized Maintenance Bandwidth
538 -- 552Wen Ming Liu, Lingyu Wang, Pengsu Cheng, Kui Ren, Shunzhi Zhu, Mourad Debbabi. PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications
553 -- 567Christophe Foket, Bjorn De Sutter, Koen De Bosschere. Pushing Java Type Obfuscation to the Limit
582 -- 595Jin Tang, Yu Cheng, Yong Hao, Wei Song. SIP Flooding Attack Detection with a Multi-Dimensional Sketch Design

Volume 11, Issue 5

399 -- 411Jaideep Vaidya, Basit Shafiq, Wei Fan, Danish Mehmood, David Lorenzi. A Random Decision Tree Framework for Privacy-Preserving Data Mining
412 -- 424Puneet Gupta, Scott D. Stoller, Zhongyuan Xu. Abductive Analysis of Administrative Policies in Rule-Based Access Control
425 -- 439Marc Liberatore, Brian Neil Levine, Clay Shields, Brian Lynn. Efficient Tagging of Remote Peers during Child Pornography Investigations
440 -- 453José Fonseca, Marco Vieira, Henrique Madeira. Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection
454 -- 466Kwantae Cho, Byung Gil Lee, Dong-Hoon Lee. Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks
467 -- 479Yogachandran Rahulamathavan, Raphael Chung-Wei Phan, Suresh Veluru, Kanapathippillai Cumanan, Muttukrishnan Rajarajan. Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud
480 -- 493Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, Paul C. van Oorschot. Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion
494 -- 496Libor Polcak, Jakub Jirasek, Petr Matousek. Comment on "Remote Physical Device Fingerprinting"

Volume 11, Issue 4

307 -- 317Silvio Cesare, Yang Xiang, Wanlei Zhou. Control Flow-Based Malware VariantDetection
318 -- 331Pietro Colombo, Elena Ferrari. Enforcing Obligations within RelationalDatabase Management Systems
332 -- 344Fengwei Zhang, Jiang Wang, Kun Sun, Angelos Stavrou. HyperCheck: A Hardware-AssistedIntegrity Monitor
345 -- 360Shu Yin, Xiaojun Ruan, Adam Manzanares, Xiao Qin, Kenli Li. MINT: A Reliability Modeling Frameworkfor Energy-Efficient Parallel Disk Systems
361 -- 374Sheng Wen, Wei Zhou, Jun Zhang, Yang Xiang, Wanlei Zhou, Weijia Jia, Cliff C. Zou. Modeling and Analysis on the Propagation Dynamics of Modern Email Malware
375 -- 389Ruofan Xia, Xiaoyan Yin, Javier Alonso Lopez, Fumio Machida, Kishor S. Trivedi. Performance and Availability Modeling of ITSystems with Data Backup and Restore
390 -- 391Wenhong Tian, Yu Chen, Xinyang Wang. A Note on "Orchestrating an Ensemble of MapReduce Jobs for Minimizing Their Makespan"
392 -- 398Kyuseung Han, Ganghee Lee, Kiyoung Choi. Software-Level Approaches for Tolerating Transient Faults in a Coarse-GrainedReconfigurable Architecture

Volume 11, Issue 3

211 -- 223Yury Zhauniarovich, Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes. MOSES: Supporting and Enforcing Security Profiles on Smartphones
224 -- 237Adam Skillen, Mohammad Mannan. Mobiflage: Deniable Storage Encryptionfor Mobile Devices
238 -- 251Christopher S. Gates, Ninghui Li, Hao Peng, Bhaskar Pratim Sarma, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy. Generating Summary Risk Scores for Mobile Applications
252 -- 265Christopher S. Gates, Jing Chen, Ninghui Li, Robert W. Proctor. Effective Risk Communication for Android Apps
266 -- 279Reza Shokri, George Theodorakopoulos, Panos Papadimitratos, Ehsan Kazemi, Jean-Pierre Hubaux. Hiding in the Mobile Crowd: LocationPrivacy through Collaboration
280 -- 291Alessio Merlo, Mauro Migliardi, Nicola Gobbo, Francesco Palmieri, Aniello Castiglione. A Denial of Service Attack to UMTS Networks Using SIM-Less Devices
292 -- 303YounHo Lee. Secure Ordered Bucketization

Volume 11, Issue 2

89 -- 100José Fonseca, Nuno Seixas, Marco Vieira, Henrique Madeira. Analysis of Field Data on Web Security Vulnerabilities
101 -- 114Xin Li, Xinyuan Wang, Wentao Chang. CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution
115 -- 129Qinghua Li, Guohong Cao, Thomas F. La Porta. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
130 -- 141Jing Zhao, Kishor S. Trivedi, Michael Grottke, Javier Alonso, Yanbin Wang. Ensuring the Performance of Apache HTTP Server Affected by Aging
142 -- 154Gorrell P. Cheek, Mohamed Shehab. Human Effects of Enhanced Privacy Management Models
155 -- 167Xun Yi, Elisa Bertino, Jaideep Vaidya, Chaoping Xing. Private Searching on Streaming Data Based on Keyword Frequency
168 -- 180Hussain M. J. Almohri, Danfeng Yao, Dennis G. Kafura. Process Authentication for High System Assurance
181 -- 192Yang Qin, Dijiang Huang, Bing Li. STARS: A Statistical Traffic Pattern Discovery System for MANETs
193 -- 206Kizito Salako, Lorenzo Strigini. When Does "Diversity" in Development Reduce Common Failures? Insights from Probabilistic Modeling

Volume 11, Issue 1

1 -- 0Elisa Bertino. Editorial
2 -- 15Hannes Holm. A Large-Scale Study of the Time Required to Compromise a Computer System
16 -- 29Leandro Fiorin, Mariagiovanna Sami. Fault-Tolerant Network Interfaces for Networks-on-Chip
30 -- 44Lingyu Wang, Sushil Jajodia, Anoop Singhal, Pengsu Cheng, Steven Noel. k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities
45 -- 58Satya Gautam Vadlamudi, Partha Pratim Chakrabarti. Robustness Analysis of Embedded Control Systems with Respect to Signal Perturbations: Finding Minimal Counterexamples Using Fault Injection
59 -- 71Noman Mohammed, Dima Alhadidi, Benjamin C. M. Fung, Mourad Debbabi. Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data
72 -- 85Nicola Basilico, Nicola Gatti, Mattia Monga, Sabrina Sicari. Security Games for Node Localization through Verifiable Multilateration