Found: 18
Select item for more details and to access through your institution.
Cover1.
- Published in:
- 2012
- Publication type:
- Front Cover
Cover2.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 4, p. c2, doi. 10.1109/TDSC.2012.42
- Publication type:
- Article
Cover3.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 4, p. c3, doi. 10.1109/TDSC.2012.43
- Publication type:
- Article
Cover4.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 4, p. c4, doi. 10.1109/TDSC.2012.81
- Publication type:
- Article
Guest Editors' Introduction: Special Section on Learning, Games, and Security.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 4, p. 449, doi. 10.1109/TDSC.2012.45
- By:
- Publication type:
- Article
Incentive Compatible Privacy-Preserving Distributed Classification.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 4, p. 451, doi. 10.1109/TDSC.2011.52
- By:
- Publication type:
- Article
Large Margin Gaussian Mixture Models with Differential Privacy.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 4, p. 463, doi. 10.1109/TDSC.2012.27
- By:
- Publication type:
- Article
On Privacy of Encrypted Speech Communications.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 4, p. 470, doi. 10.1109/TDSC.2011.56
- By:
- Publication type:
- Article
A Learning-Based Approach to Reactive Security.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 4, p. 482, doi. 10.1109/TDSC.2011.42
- By:
- Publication type:
- Article
ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 4, p. 494, doi. 10.1109/TDSC.2011.65
- By:
- Publication type:
- Article
DoubleGuard: Detecting Intrusions in Multitier Web Applications.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 4, p. 512, doi. 10.1109/TDSC.2011.59
- By:
- Publication type:
- Article
Automated Security Test Generation with Formal Threat Models.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 4, p. 526, doi. 10.1109/TDSC.2012.24
- By:
- Publication type:
- Article
Enforcing Mandatory Access Control in Commodity OS to Disable Malware.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 4, p. 541, doi. 10.1109/TDSC.2012.36
- By:
- Publication type:
- Article
Ensuring Distributed Accountability for Data Sharing in the Cloud.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 4, p. 556, doi. 10.1109/TDSC.2012.26
- By:
- Publication type:
- Article
Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 4, p. 569, doi. 10.1109/TDSC.2012.37
- By:
- Publication type:
- Article
Recommendation Models for Open Authorization.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 4, p. 583, doi. 10.1109/TDSC.2012.34
- By:
- Publication type:
- Article
Resilient Authenticated Execution of Critical Applications in Untrusted Environments.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 4, p. 597, doi. 10.1109/TDSC.2012.25
- By:
- Publication type:
- Article
Secure Failure Detection and Consensus in TrustedPals.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 4, p. 610, doi. 10.1109/TDSC.2012.23
- By:
- Publication type:
- Article