You are on page 1of 3

DS1201 DS1202 DS1203 DS1204 DS1205 DS1206 DS1207 DS1208 DS1209 DS1210 DS1211 DS1212 DS1213 DS1214 DS1215

IEEE Titles 2012 DEPENDABLE & SECURE COMPUTING A Flexible Approach to Improving System Reliability with Virtual Lockstep A Flexible Approach to Multisession Trust Negotiations A Learning-Based Approach to Reactive Security A Stochastic Model of Multivirus Dynamics A Taxonomy of Buffer Overflow Characteristics Automatic Reconfiguration for Large-Scale Reliable Storage Systems Compiler-Directed Soft Error Mitigation for Embedded Systems Conditional Diagnosability of Augmented Cubes under the PMC Model Data-Provenance Verification For Secure Hosts

Detecting and Resolving Firewall Policy Anomalies

Dynamic Security Risk Management Using Bayesian Attack Graphs Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation

DS1216 DS1217 DS1218 DS1219 DS1220 DS1221

Capabilities Ensuring Distributed Accountability for Data Sharing in the Cloud ES-MPICH2: A Message Passing Interface with Enhanced Security Extending Attack Graph-Based Security Metrics and Aggregating Their Application Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals Incentive Compatible Privacy-Preserving Distributed Classification

(c

Detecting Spam Zombies by Monitoring Outgoing Messages

)K

DoubleGuard: Detecting Intrusions in Multitier Web Applications

LE

Detecting Anomalous Insiders in Collaborative Information Systems

SO

LU

TI

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

DS1222 DS1223 DS1224

IEEE Titles 2012 DEPENDABLE & SECURE COMPUTING Iterative Trust and Reputation Management Using Belief Propagation Large Margin Gaussian Mixture Models with Differential Privacy Low Energy Online Self-Test of Embedded Processors in Dependable WSN Nodes Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock

DS1225 DS1226 DS1227

Drifts M-Score: A Misuseability Weight Measure On the Security and Efficiency of Content Distribution via Network Coding On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh

DS1230

pCloud: A Distributed System for Practical PIR

DS1233 DS1234 DS1235 DS1236 DS1237 DS1238

Recommendation Models for Open Authorization Remote Attestation with Domain-Based Integrity Model and Policy Analysis Resilient Authenticated Execution of Critical Applications in Untrusted Environments Revisiting Defenses against Large-Scale Online Password Guessing Attacks Risk-Aware Mitigation for MANET Routing Attacks Secure Failure Detection and Consensus in TrustedPals SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent

DS1239

Systems

(c )

DS1232

Quantitative Analysis of Consensus Algorithms

DS1231

Knowledge-Based Authentication Mechanism

LE

Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a

SO

LU

TI

DS1229

Packet-Hiding Methods for Preventing Selective Jamming Attacks

DS1228

Networks

IEEE Titles 2012 DEPENDABLE & SECURE COMPUTING Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management DS1240 DS1241 DS1242 Scheme for Secure Broadcasting Stabilization Enabling Technology Survivability Experiment and Attack Characterization for RFID

(c )

LE

SO

LU

TI

You might also like