81 | -- | 95 | Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas. Accurately Measuring Denial of Service in Simulation and Testbed Experiments |
96 | -- | 110 | Debin Gao, Michael K. Reiter, Dawn Xiaodong Song. Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance |
111 | -- | 123 | Patrick Tague, David Slater, Jason Rogers, Radha Poovendran. Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis |
124 | -- | 134 | George Xenoulis, Dimitris Gizopoulos, Mihalis Psarakis, Antonis M. Paschalis. Instruction-Based Online Periodic Self-Testing of Microprocessors with Floating-Point Units |
135 | -- | 148 | Alex Shye, Joseph Blomstedt, Tipp Moseley, Vijay Janapa Reddi, Daniel A. Connors. PLR: A Software Approach to Transient Fault Tolerance for Multicore Architectures |
149 | -- | 151 | Huaqun Wang, Futai Zhang, Yanfei Sun. Cryptanalysis of a Generalized Ring Signature Scheme |
152 | -- | 158 | Dimitris Gizopoulos. Online Periodic Self-Test Scheduling for Real-Time Processor-Based Systems Dependability Enhancement |
159 | -- | 160 | Hung-Min Sun, King-Hang Wang, Chien-Ming Chen. On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme |