Ieee Transactions On Dependable And Secure Computing

Ieee Transactions On Dependable And Secure Computing

关于可靠和安全计算的 IEEE 交易

  • 2区 中科院分区
  • Q1 JCR分区

高引用文章

文章名称 引用次数
Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams 134
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound 52
Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment 38
Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks 37
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention 32
Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy 31
Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers 26
Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense 23
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems 22
Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing 20
A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet 19
A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network 17
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection 15
Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling 13
Searchable Encryption over Feature-Rich Data 12
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud 10
Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems 10
Attribute-based Access Control for ICN Naming Scheme 10
Separable Reversible Data Hiding in Encrypted JPEG Bitstreams 9
Design, Analysis, and Implementation of ARPKI An Attack-Resilient Public-Key Infrastructure 9
On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification 9
Detecting and Mitigating Target Link-Flooding Attacks Using SDN 8
Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness 7
Relating Extra Connectivity and Extra Conditional Diagnosability in Regular Networks 7
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation 7
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively 7
Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection 7
ARF-Predictor: Effective Prediction of Aging-Related Failure Using Entropy 7
Privacy-Preserving Aggregate Queries for Optimal Location Selection 6
Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage 6
A Credibility Analysis System for Assessing Information on Twitter 6
The g-Good-Neighbor Conditional Diagnosability of Arrangement Graphs 6
Conditional Diagnosability of (n,k)-Star Graphs Under the PMC Model 6
Towards Automated Log Parsing for Large-Scale Log Data Analysis 6
Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things 6
Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks 5
Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks 5
PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks 5
Dynamic Optimal Countermeasure Selection for Intrusion Response System 5
PrivateZone: Providing a Private Execution Environment Using ARM TrustZone 5
Supersingular Isogeny Diffie-Hellman Key Exchange on 64-Bit ARM 5
Privacy-Preserving Multi-Keyword Top-k Similarity Search Over Encrypted Data 5
Privacy-Aware Caching in Information-Centric Networking 4
The Rise of Social Botnets: Attacks and Countermeasures 4
Rmind: A Tool for Cryptographically Secure Statistical Analysis 4
GeTrust: A Guarantee-Based Trust Model in Chord-Based P2P Networks 4
Rumor Source Identification in Social Networks with Time-Varying Topology 4
LARGen: Automatic Signature Generation for Malwares Using Latent Dirichlet Allocation 4
AccConF: An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge 4
Advancing the State-of-the-Art in Hardware Trojans Detection 4