161 | -- | 176 | Ing-Ray Chen, Anh Phan Speer, Mohamed Eltoweissy. Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks |
177 | -- | 193 | Marco Serafini, Péter Bokor, Neeraj Suri, Jonny Vinter, Astrit Ademaj, Wolfgang Brandstätter, Fulvio Tagliabo, Jens Koch. Application-Level Diagnostic and Membership Protocols for Generic Time-Triggered Systems |
194 | -- | 206 | Dennis Heimbigner. A Tamper-Resistant Programming Language System |
207 | -- | 217 | Jacques Henri Collet, Piotr Zajac, Mihalis Psarakis, Dimitris Gizopoulos. Chip Self-Organization and Fault Tolerance in Massively Defective Multicore Arrays |
218 | -- | 232 | Jelena Mirkovic, Ezra Kissel. Comparative Evaluation of Spoofing Defenses |
233 | -- | 245 | John Felix Charles Joseph, Bu-Sung Lee, Amitabha Das, Boon-Chong Seet. Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA |
246 | -- | 255 | Sun-Yuan Hsieh, Chia-Wei Lee. Diagnosability of Two-Matching Composition Networks under the MM:::ast::: Model |
256 | -- | 269 | Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sean W. Smith. Nymble: Blocking Misbehaving Users in Anonymizing Networks |
270 | -- | 281 | Sascha Grau, Mathias Fischer, Michael Brinkmeier, Günter Schäfer. On Complexity and Approximability of Optimal DoS Attacks on Multiple-Tree P2P Streaming Topologies |
282 | -- | 294 | Alexander Hofmann, Bernhard Sick. Online Intrusion Alert Aggregation with Generative Data Stream Modeling |
295 | -- | 307 | Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fang. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks |
308 | -- | 314 | Marta Portela-García, Celia López-Ongil, Mario García-Valderas, Luis Entrena. Fault Injection in Modern Microprocessors Using On-Chip Debugging Infrastructures |
315 | -- | 317 | Hung-Min Sun, Wei-Chih Ting, King-Hang Wang. On the Security of Chien s Ultralightweight RFID Authentication Protocol |