Found: 18
Select item for more details and to access through your institution.
2011 Reviewers List.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 1, p. 142, doi. 10.1109/TDSC.2012.2
- Publication type:
- Article
Cover4.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 1, p. c4, doi. 10.1109/TDSC.2012.81
- Publication type:
- Article
Cover3.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 1, p. c3, doi. 10.1109/TDSC.2012.5
- Publication type:
- Article
New respository for journal updates.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 1, p. 144, doi. 10.1109/TDSC.2012.8
- Publication type:
- Article
2011 Annual Index.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 1, p. N.PAG, doi. 10.1109/TDSC.2012.1
- Publication type:
- Article
Editorial.
- Published in:
- 2012
- By:
- Publication type:
- Editorial
A Flexible Approach to Multisession Trust Negotiations.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 1, p. 16, doi. 10.1109/TDSC.2011.31
- By:
- Publication type:
- Article
Cover1.
- Published in:
- 2012
- Publication type:
- Table of Contents
Packet-Hiding Methods for Preventing Selective Jamming Attacks.
- Published in:
- 2012
- By:
- Publication type:
- Case Study
Dynamic Security Risk Management Using Bayesian Attack Graphs.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 1, p. 61, doi. 10.1109/TDSC.2011.34
- By:
- Publication type:
- Article
A Stochastic Model of Multivirus Dynamics.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 1, p. 30, doi. 10.1109/TDSC.2011.33
- By:
- Publication type:
- Article
Cover2.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 1, p. c2, doi. 10.1109/TDSC.2012.42
- Publication type:
- Article
Revisiting Defenses against Large-Scale Online Password Guessing Attacks.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 1, p. 128, doi. 10.1109/TDSC.2011.24
- By:
- Publication type:
- Article
Low Energy Online Self-Test of Embedded Processors in Dependable WSN Nodes.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 1, p. 86, doi. 10.1109/TDSC.2011.17
- By:
- Publication type:
- Article
Extending Attack Graph-Based Security Metrics and Aggregating Their Application.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 1, p. 75, doi. 10.1109/TDSC.2010.61
- By:
- Publication type:
- Article
pCloud: A Distributed System for Practical PIR.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 1, p. 115, doi. 10.1109/TDSC.2010.60
- By:
- Publication type:
- Article
Conditional Diagnosability of Augmented Cubes under the PMC Model.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 1, p. 46, doi. 10.1109/TDSC.2010.59
- By:
- Publication type:
- Article
A Flexible Approach to Improving System Reliability with Virtual Lockstep.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 1, p. 2, doi. 10.1109/TDSC.2010.53
- By:
- Publication type:
- Article