Journal: IEEE Trans. Dependable Sec. Comput.

Volume 12, Issue 6

602 -- 614Andrew Newell, Daniel Obenshain, Thomas Tantillo, Cristina Nita-Rotaru, Yair Amir. Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes
615 -- 625Xixiang Lv, Yi Mu, Hui Li 0006. Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs
626 -- 639Hannes Holm, Khurram Shahzad, Markus Buschle, Mathias Ekstedt. 2CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language
640 -- 651Wilko Henecka, Matthew Roughan. Privacy-Preserving Fraud Detection Across Multiple Phone Record Databases
652 -- 664Tilman Wolf, Harikrishnan Kumarapillai Chandrikakutty, Kekai Hu, Deepak Unnikrishnan, Russell Tessier. Securing Network Processors with High-Performance Hardware Monitors
665 -- 674Ahmed Bendahmane, Mohamed Essaaidi, Ahmed El Moussaoui, Ali Younes. The Effectiveness of Reputation-Based Voting for Collusion Tolerance in Large-Scale Grids
675 -- 687Aziz Mohaisen, Hesham Mekky, Xinwen Zhang, Haiyong Xie, Yongdae Kim. Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures
688 -- 707Lwin Khin Shar, Lionel C. Briand, Hee Beng Kuan Tan. Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning

Volume 12, Issue 5

491 -- 503Tilo Müller, Felix C. Freiling. A Systematic Assessment of the Security of Full Disk Encryption
504 -- 518Yuan Hong, Jaideep Vaidya, Haibing Lu, Panagiotis Karras, Sanjay Goel. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
519 -- 532Sakthi Vignesh Radhakrishnan, A. Selcuk Uluagac, Raheem A. Beyah. GTID: A Technique for Physical Device and Device Type Fingerprinting
533 -- 545Zhongyuan Xu, Scott D. Stoller. Mining Attribute-Based Access Control Policies
546 -- 556Xiaofeng Chen 0001, Jin Li, Xinyi Huang, Jianfeng Ma, Wenjing Lou. New Publicly Verifiable Databases with Efficient Updates
557 -- 570Aravind Prakash, Eknath Venkataramani, Heng Yin, Zhiqiang Lin. On the Trustworthiness of Memory Analysis - An Empirical Study from the Perspective of Binary Execution
571 -- 584Yiming Jing, Gail-Joon Ahn, Ziming Zhao, Hongxin Hu. Towards Automated Risk Assessment and Mitigation of Mobile Applications
585 -- 596Benjamin W. P. Ramsey, Barry E. Mullins, Michael A. Temple, Michael R. Grimaila. Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation

Volume 12, Issue 4

375 -- 386Chin-Hsien Wu, Po-Han Wu, Kuo-long Chen, Wen-Yen Chang, Kun-Cheng Lai. A Hotness Filter of Files for Reliable Non-Volatile Memory Systems
387 -- 399Dongkyun Ahn, Gyungho Lee. A Memory-Access Validation Scheme against Payload Injection Attacks
400 -- 412Lei Cen, Christopher S. Gates, Luo Si, Ninghui Li. A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code
413 -- 427Linke Guo, Chi Zhang, Yuguang Fang. A Trust-Based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
428 -- 442Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu. Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
443 -- 457Phu H. Phung, Maliheh Monshizadeh, Meera Sridhar, Kevin W. Hamlen, V. N. Venkatakrishnan. Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content
458 -- 471Jia-Dong Zhang, Chi-Yin Chow. REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks
472 -- 484Robbert van Renesse, Nicolas Schiper, Fred B. Schneider. Vive La Différence: Paxos vs. Viewstamped Replication vs. Zab
485 -- 490Massimo Cafaro, Roberto Civino, Barbara Masucci. On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes in the Unconditional Setting

Volume 12, Issue 3

256 -- 269Salmin Sultana, Gabriel Ghinita, Elisa Bertino, Mohamed Shehab. A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks
270 -- 283Andrea Ceccarelli, Leonardo Montecchi, Francesco Brancati, Paolo Lollini, Angelo Marguglio, Andrea Bondavalli. Continuous and Transparent User Identity Verification for Secure Internet Services
284 -- 297Michael Le, Yuval Tamir. Fault Injection in Virtualized Systems - Challenges and Applications
298 -- 311Qi Li, Xinwen Zhang, Xin Zhang, Purui Su. Invalidating Idealized BGP Security Proposals and Countermeasures
312 -- 325Juan E. Tapiador, Agustín Orfila, Arturo Ribagorda, Benjamín Ramos. Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System
326 -- 337Aditi Gupta 0002, Javid Habibi, Michael S. Kirkpatrick, Elisa Bertino. Marlin: Mitigating Code Reuse Attacks Using Code Randomization
338 -- 350Alex Klinkhamer, Ali Ebnenasir. On the Hardness of Adding Nonmasking Fault Tolerance
351 -- 365Sisi Liu, Loukas Lazos, Marwan Krunz. Time-Delayed Broadcasting for Defeating Inside Jammers
366 -- 372Antonio Bovenzi, Francesco Brancati, Stefano Russo, Andrea Bondavalli. An OS-level Framework for Anomaly Detection in Complex Software Systems
373 -- 374Youwen Zhu, Zhiqiu Huang, Liusheng Huang, Tsuyoshi Takagi. On the Security of A Privacy-Preserving Product Calculation Scheme

Volume 12, Issue 2

135 -- 0Elisa Bertino. The State of the Journal Editorial
136 -- 149Goran Delac, Marin Silic, Sinisa Srbljic. A Reliability Improvement Method for SOA-Based Applications
150 -- 163Bilal Shebaro, Oyindamola Oluwatimi, Elisa Bertino. Context-Based Access Control Systems for Mobile Devices
164 -- 178Hisham A. Kholidy, Fabrizio Baiardi, Salim Hariri. DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
179 -- 189David Megías. Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints
190 -- 203Siru Ni, Yi Zhuang, Zining Cao, Xiangying Kong. Modeling Dependability Features for Real-Time Embedded Systems
204 -- 216Reza Entezari-Maleki, Kishor S. Trivedi, Ali Movaghar. Performability Evaluation of Grid Environments Using Stochastic Reward Nets
217 -- 229Ousmane Amadou Dia, Csilla Farkas. Risk Aware Query Replacement Approach for Secure Databases Performance Management
230 -- 242Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, Wanlei Zhou. Secure Tag Search in RFID Systems Using Mobile Readers
243 -- 255Long Wang, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Arun Iyengar. VM-μCheckpoint: Design, Modeling, and Assessment of Lightweight In-Memory VM Checkpointing

Volume 12, Issue 1

1 -- 15Yuhui Zhong, Bharat K. Bhargava, Yi Lu, Pelin Angin. A Computational Dynamic Trust Model for User Authorization
16 -- 30Rob Mitchell, Ing-Ray Chen. Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
31 -- 44Zhuo Lu, Wenye Wang, Cliff Wang. Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming
45 -- 57Taeho Jung, Xiang-Yang Li, Meng Wan. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
58 -- 70Sisi Duan, Sean Peisert, Karl N. Levitt. hBFT: Speculative Byzantine Fault Tolerance with Minimum Cost
71 -- 84Pullamsetty Harika, Marreddy Nagajyothi, John C. John, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri. Meeting Cardinality Constraints in Role Mining
85 -- 97Tat Wing Chim, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui, Jin Zhong. PRGA: Privacy-Preserving Recording & Gateway-Assisted Authentication of Power Usage Information for Smart Grid
98 -- 110Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay Jha. Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
111 -- 124Rui Zhang 0007, Jingchao Sun, Yanchao Zhang, Chi Zhang. Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers