Journal: IEEE Trans. Dependable Sec. Comput.

Volume 15, Issue 6

913 -- 914Domenico Cotroneo, Karthik Pattabiraman, Antonio Pecchia. Guest Editors' Introduction: Special Issue on Data-Driven Dependability and Security
915 -- 930Saurabh Jha, Valerio Formicola, Catello Di Martino, Mark Dalton, William T. Kramer, Zbigniew Kalbarczyk, Ravishankar K. Iyer. Resiliency of HPC Interconnects: A Case Study of Interconnect Failures and Recovery in Blue Waters
931 -- 944Pinjia He, Jieming Zhu, Shilin He, Jian Li, Michael R. Lyu. Towards Automated Log Parsing for Large-Scale Log Data Analysis
945 -- 958Oliver Schwahn, Stefan Winter 0001, Nicolas Coppik, Neeraj Suri. How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code
959 -- 973Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan. Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks
974 -- 987Santosh Aditham, Nagarajan Ranganathan. A System Architecture for the Detection of Insider Attacks in Big Data Systems
988 -- 1001Christopher N. Gutierrez, TaeGyu Kim, Raffaele Della Corte, Jeffrey Avery, Dan Goldwasser, Marcello Cinque, Saurabh Bagchi. Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks
1002 -- 1015Pontus Johnson, Robert Lagerström, Mathias Ekstedt, Ulrik Franke. Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis
1016 -- 1026Bo Liu 0001, Wanlei Zhou, Longxiang Gao, Haibo Zhou, Tom H. Luan, Sheng Wen. Malware Propagations in Wireless Ad Hoc Networks
1027 -- 1040Boyang Wang, Xinxin Fan. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
1041 -- 1054Jun-Young Kim, Wen Hu, Hossein Shafagh, Sanjay Jha. SEDA: Secure Over-the-Air Code Dissemination Protocol for the Internet of Things
1055 -- 1067Zhenxing Qian, Hang Zhou, Xinpeng Zhang, Weiming Zhang. Separable Reversible Data Hiding in Encrypted JPEG Bitstreams
1068 -- 1082Jinxue Zhang, Rui Zhang 0007, Yanchao Zhang, Guanhua Yan. The Rise of Social Botnets: Attacks and Countermeasures
1083 -- 1095Zhiguo Wan, Robert H. Deng. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data

Volume 15, Issue 5

729 -- 741Anastasios N. Bikos, Nicolas Sklavos. Architecture Design of an Area Efficient High Speed Crypto Processor for 4G LTE
742 -- 754Le Guan, Jingqiang Lin, ZiQiang Ma, Bo Luo, Luning Xia, Jiwu Jing. Copker: A Cryptographic Engine Against Cold-Boot Attacks
755 -- 770Alireza Shameli Sendi, Habib Louafi, Wenbo He, Mohamed Cheriet. Dynamic Optimal Countermeasure Selection for Intrusion Response System
771 -- 783Suchul Lee, Sungho Kim, SungIl Lee, Jaehyuk Choi, Hanjun Yoon, DoHoon Lee, Jun-Rak Lee. LARGen: Automatic Signature Generation for Malwares Using Latent Dirichlet Allocation
784 -- 796Qiang Tang 0001, Jun Wang 0020. Privacy-Preserving Friendship-Based Recommender Systems
797 -- 810Jin Soo Jang, Changho Choi, Jae-Hyuk Lee, Nohyun Kwak, Seongman Lee, Yeseul Choi, Brent ByungHoon Kang. PrivateZone: Providing a Private Execution Environment Using ARM TrustZone
811 -- 823Daniel Sun, Alan Fekete, Vincent Gramoli, Guoqiang Li 0001, Xiwei Xu, Liming Zhu. 2C: Robust Rolling-Upgrade in Clouds
824 -- 839Santanu Chatterjee, Sandip Roy, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar 0001, Athanasios V. Vasilakos. Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment
840 -- 852Nurzhan Zhumabekuly Aitzhan, Davor Svetinovic. Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams
853 -- 867Tao Wang 0026, Yao Liu 0007, Tao Hou, Qingqi Pei, Song Fang. Signal Entanglement Based Pinpoint Waveforming for Location-Restricted Service Access Control
868 -- 882Xingliang Yuan, Xinyu Wang, Cong Wang 0001, Anna Cinzia Squicciarini, Kui Ren 0001. Towards Privacy-Preserving and Practical Image-Centric Social Discovery
883 -- 897Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei. White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively
898 -- 905Ruben Lumbiarres-Lopez, Mariano López-García, Enrique F. Cantó-Navarro. Hardware Architecture Implemented on FPGA for Protecting Cryptographic Keys against Side-Channel Attacks
906 -- 912Xingxin Li, Youwen Zhu, Jian Wang, Zhe Liu, Yining Liu, Mingwu Zhang. On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification

Volume 15, Issue 4

549 -- 550Meikang Qiu, Yang Xiang 0001, Yan Zhang. Guest Editor's Introduction to the Special Section on Social Network Security
551 -- 560Muhammad Usman Shahid Khan, Mazhar Ali, Assad Abbas, Samee U. Khan, Albert Y. Zomaya. Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter
561 -- 576Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi. Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling
577 -- 590Zhipeng Cai, Zaobo He, Xin Guan, Yingshu Li. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks
591 -- 606Qian Wang 0002, Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin, Kui Ren 0001. Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy
607 -- 620Kuan Zhang, Xiaohui Liang, Jianbing Ni, Kan Yang 0001, Xuemin Sherman Shen. Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage
621 -- 632Meriem Guerar, Mauro Migliardi, Alessio Merlo, Mohamed Benmohammed, Francesco Palmieri, Aniello Castiglione. Using Screen Brightness to Improve Security in Mobile Social Network Access
633 -- 645Debiao He, Neeraj Kumar 0001, Huaqun Wang, Lina Wang, Kim-Kwang Raymond Choo, Alexey V. Vinel. A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network
646 -- 660Huaxin Li, Haojin Zhu, Suguo Du, Xiaohui Liang, Xuemin Sherman Shen. Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense
661 -- 674Majed A. Alrubaian, Muhammad Al-Qurishi, Mohammad Mehedi Hassan, Atif Alamri. A Credibility Analysis System for Assessing Information on Twitter
675 -- 693Pengfei Chen, Yong Qi, Xinyi Li, Di Hou, Michael Rung-Tsong Lyu. ARF-Predictor: Effective Prediction of Aging-Related Failure Using Entropy
694 -- 707Jan Stanek, Lukas Kencl. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
708 -- 722Ding Wang 0002, Ping Wang 0003. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
723 -- 728Masahiro Kaminaga, Hideki Yoshikawa, Arimitsu Shikoda, Toshinori Suzuki. Crashing Modulus Attack on Modular Squaring for Rabin Cryptosystem

Volume 15, Issue 3

364 -- 377Elias Bou-Harb, Chadi Assi, Mourad Debbabi. CSC-Detector: A System to Infer Large-Scale Probing Campaigns
378 -- 392Fanfu Zhou, Zhengwei Qi, Jianguo Yao, Ruhui Ma, Bin Wang, Athanasios V. Vasilakos, Haibing Guan. 2FL: Design and Implementation of Distributed Dynamic Fault Localization
393 -- 408David A. Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski. Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure
409 -- 422Hui Cui, Zhiguo Wan, Robert H. Deng, Guilin Wang, Yingjiu Li. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
423 -- 436Hossen A. Mustafa, Wenyuan Xu, Ahmad-Reza Sadeghi, Steffen Schulz 0001. End-to-End Detection of Caller ID Spoofing Attacks
437 -- 451Dmitry Evtyushkin, Jesse Elwell, Meltem Ozsoy, Dmitry Ponomarev, Nael B. Abu-Ghazaleh, Ryan Riley. Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications
452 -- 465Petr Novotný 0002, Bong-Jun Ko, Alexander L. Wolf. Locating Faults in MANET-Hosted Software Systems
466 -- 480Christos Tsigkanos, Liliana Pasquale, Carlo Ghezzi, Bashar Nuseibeh. On the Interplay Between Cyber and Physical Spaces for Adaptive Security
481 -- 495Dan Bogdanov, Liina Kamm, Sven Laur, Ville Sokk. Rmind: A Tool for Cryptographically Secure Statistical Analysis
496 -- 510Qian Wang 0002, Meiqi He, Minxin Du, Sherman S. M. Chow, Russell W. F. Lai, Qin Zou. Searchable Encryption over Feature-Rich Data
511 -- 525Miguel Garcia, Nuno Neves 0001, Alysson Bessani. SieveQ: A Layered BFT Protection System for Critical Services
526 -- 541Fathiyeh Faghih, Borzoo Bonakdarpour. Symbolic Synthesis of Timed Models with Strict 2-Phase Fault Recovery
542 -- 548Limei Lin, Li Xu 0002, Dajin Wang, Shuming Zhou. The g-Good-Neighbor Conditional Diagnosability of Arrangement Graphs

Volume 15, Issue 2

180 -- 193Hung-Min Sun, Shiuan-Tung Chen, Jyh-haw Yeh, Chia-Yun Cheng. A Shoulder Surfing Resistant Graphical Authentication System
194 -- 206Bing Li, Dijiang Huang, Zhijie Wang, Yan Zhu 0010. Attribute-based Access Control for ICN Naming Scheme
207 -- 216Nai-Wen Chang, Sun-Yuan Hsieh. Conditional Diagnosability of (n, k)-Star Graphs Under the PMC Model
217 -- 230Xinxin Zhao, Lingjun Li, Guoliang Xue, Gail-Joon Ahn. Efficient Anonymous Message Submission
231 -- 245Yan Li, Yingjiu Li, Ke Xu, Qiang Yan, Robert H. Deng. Empirical Study of Face Authentication Systems Under OSNFD Attacks
246 -- 259Eduardo Adílio Pelinson Alchieri, Alysson Bessani, Fabíola Greve, Joni da Silva Fraga. Knowledge Connectivity Requirements for Solving Byzantine Consensus with Unknown Participants
260 -- 274Taeho Jung, Junze Han, Xiang-Yang Li. PDA: Semantically Secure Time-Series Data Analytics with Dynamic User Groups
275 -- 288Thomas Roth, Bruce McMillin. Physical Attestation in the Smart Grid for Distributed State Verification
289 -- 294Martin Goll, Shay Gueron. Randomness Tests in Hostile Environments
295 -- 308Naeimeh Laleh, Barbara Carminati, Elena Ferrari. Risk Assessment in Social Networks Based on User Anomalous Behaviors
309 -- 320Weili Han, Zhigong Li, Minyue Ni, Guofei Gu, Wenyuan Xu. Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis
321 -- 335Fengwei Zhang, Kevin Leach, Angelos Stavrou, Haining Wang. Towards Transparent Debugging
336 -- 350Nosayba El-Sayed, Bianca Schroeder. Understanding Practical Tradeoffs in HPC Checkpoint-Scheduling Policies
351 -- 356Chia-Chen Wei, Chun-An Chen, Sun-Yuan Hsieh. Conditional (t, k)-Diagnosis in Regular and Irregular Graphs Under the Comparison Diagnosis Model
357 -- 363Myungsun Kim, Hyung Tae Lee, San Ling, Huaxiong Wang. On the Efficiency of FHE-Based Private Queries

Volume 15, Issue 1

1 -- 0Jaideep Vaidya. Editorial
2 -- 13Arash Nourian, Stuart E. Madnick. A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet
14 -- 26Saurabh Shintre, Virgil D. Gligor, João Barros. Anonymity Leakage in Private VoIP Networks
27 -- 39Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Rongxing Lu, Jian Weng. Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers
40 -- 53Domenico Cotroneo, Anna Lanzaro, Roberto Natella. Faultprog: Testing the Accuracy of Binary-Level Software Fault Injection
54 -- 68Xianfu Meng, Dongxu Liu. GeTrust: A Guarantee-Based Trust Model in Chord-Based P2P Networks
69 -- 82Attila Altay Yavuz. Immutable Authentication and Integrity Schemes for Outsourced Databases
83 -- 97Andrea Saracino, Daniele Sgandurra, Gianluca Dini, Fabio Martinelli. MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention
98 -- 111Peng Zhou, Rocky K. C. Chang, Xiaojing Gu, Minrui Fei, Jianying Zhou 0001. Magic Train: Design of Measurement Methods against Bandwidth Inflation Attacks
112 -- 125Dongdong Zhao, Wenjian Luo, Ran Liu, Lihua Yue. Negative Iris Recognition
126 -- 137Yuchang Mo, Liudong Xing, Joanne Bechta Dugan. Performability Analysis of k-to-l-Out-of-n Computing Systems Using Binary Decision Diagrams
138 -- 150Fumio Machida, Ruofan Xia, Kishor S. Trivedi. Performability Modeling for RAID Storage Systems by Markov Regenerative Process
151 -- 165Jin-Hee Cho, Ing-Ray Chen. PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks
166 -- 179Jiao Jiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou. Rumor Source Identification in Social Networks with Time-Varying Topology