Home
Research Trends
Scientific Articles
Journals
Scientific Journals
Open Access Journals
Journals Search
Contact
Sign Up
Login
Language
English
German
IEEE Transactions on Dependable and Secure Computing
Title
Publication Date
Language
Citations
A Credibility Analysis System for Assessing Information on Twitter
2017/01/01
3
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
2018/05/01
3
A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network
2018/07/01
3
Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction
2021/01/01
3
Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data
2020/11/01
3
Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks
2020/11/01
3
MARP: A Distributed MAC Layer Attack Resistant Pseudonym Scheme for VANET
2020/07/01
3
EC2: Ensemble Clustering and Classification for Predicting Android Malware Families
2020/03/01
3
WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream
2013/05/01
3
Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data
2013/07/01
3
Model-based evaluation: from dependability to security
2004/01/01
English
3
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
2007/01/01
3
Architecture-Based Software Reliability Analysis: Overview and Limitations
2007/01/01
3
An Obfuscation-Based Approach for Protecting Location Privacy
2011/01/01
3
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators
2022/01/01
3
Update Recovery Attacks on Encrypted Database within Two Updates using Range Queries Leakage
2020/01/01
3
Secret-to-Image Reversible Transformation for Generative Steganography
2023/09/01
3
Adaptive Video Data Hiding through Cost Assignment and STCs
2019/01/01
3
Trust Assessment in Online Social Networks
2021/03/01
3
Robust and Universal Seamless Handover Authentication in 5G HetNets
2021/03/01
3
Impact of Service Function Aging on the Dependability for MEC Service Function Chain
2023/07/01
3
LoMar: A Local Defense Against Poisoning Attack on Federated Learning
2023/01/01
3
Eight Years of Rider Measurement in the Android Malware Ecosystem
2022/01/01
3
Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography
2019/01/01
3
Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs
2016/01/01
3
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms
2007/04/01
3
Achieving Privacy-Preserving Online Diagnosis With Outsourced SVM in Internet of Medical Things Environment
2022/11/01
3
A Rigorous, Compositional, and Extensible Framework for Dynamic Fault Tree Analysis
2010/04/01
3
Autonomic Trust Management for a Component-Based Software System
2011/11/01
3
Automated Security Test Generation with Formal Threat Models
2012/07/01
3
«
‹ Pervious
Next ›
»