IEEE Transactions on Dependable and Secure Computing

Title Publication Date Language Citations
Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams2018/09/0124
Basic concepts and taxonomy of dependable and secure computing2004/01/01English23
Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices2020/01/0122
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound2016/01/0122
Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks2016/01/0117
DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive2019/01/0117
Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features2021/01/0113
PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks2021/03/0110
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention2018/01/0110
SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity2007/10/019
Credit Card Fraud Detection Using Hidden Markov Model2008/01/019
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks2022/01/019
Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment2018/09/019
Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data2016/05/018
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection2022/01/017
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment2020/03/017
A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code2015/07/017
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities2022/07/017
Dynamic Security Risk Management Using Bayesian Attack Graphs2012/01/017
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?2012/11/016
μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection2019/01/016
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting2021/05/016
A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet2018/01/016
Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense2018/07/016
Towards Detecting Compromised Accounts on Social Networks2017/07/016
SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems2012/03/016
Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds2021/05/015
Malware Detection in Cloud Computing Infrastructures2016/03/015
Hiding in the Mobile Crowd: LocationPrivacy through Collaboration2014/05/015
Robust Multi-Factor Authentication for Fragile Communications2014/11/015