IEEE Transactions on Dependable and Secure Computing

Title Publication Date Language Citations
A Credibility Analysis System for Assessing Information on Twitter2017/01/013
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud2018/05/013
A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network2018/07/013
Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction2021/01/013
Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data2020/11/013
Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks2020/11/013
MARP: A Distributed MAC Layer Attack Resistant Pseudonym Scheme for VANET2020/07/013
EC2: Ensemble Clustering and Classification for Predicting Android Malware Families2020/03/013
WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream2013/05/013
Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data2013/07/013
Model-based evaluation: from dependability to security2004/01/01English3
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes2007/01/013
Architecture-Based Software Reliability Analysis: Overview and Limitations2007/01/013
An Obfuscation-Based Approach for Protecting Location Privacy2011/01/013
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators2022/01/013
Update Recovery Attacks on Encrypted Database within Two Updates using Range Queries Leakage2020/01/013
Secret-to-Image Reversible Transformation for Generative Steganography2023/09/013
Adaptive Video Data Hiding through Cost Assignment and STCs2019/01/013
Trust Assessment in Online Social Networks2021/03/013
Robust and Universal Seamless Handover Authentication in 5G HetNets2021/03/013
Impact of Service Function Aging on the Dependability for MEC Service Function Chain2023/07/013
LoMar: A Local Defense Against Poisoning Attack on Federated Learning2023/01/013
Eight Years of Rider Measurement in the Android Malware Ecosystem2022/01/013
Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography2019/01/013
Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs2016/01/013
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms2007/04/013
Achieving Privacy-Preserving Online Diagnosis With Outsourced SVM in Internet of Medical Things Environment2022/11/013
A Rigorous, Compositional, and Extensible Framework for Dynamic Fault Tree Analysis2010/04/013
Autonomic Trust Management for a Component-Based Software System2011/11/013
Automated Security Test Generation with Formal Threat Models2012/07/013