The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Trans. Dependable Sec. Comput.
2006, volume: 3, number: 4

  1. Junghee Han, David Watson, Farnam Jahanian
    An Experimental Study of Internet Path Diversity. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:4, pp:273-288 [Journal]
  2. Zachary K. Baker, Viktor K. Prasanna
    Automatic Synthesis of Efficient Intrusion Detection Systems on FPGAs. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:4, pp:289-300 [Journal]
  3. Anthony Y. Fu, Liu Wenyin, Xiaotie Deng
    Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD). [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:4, pp:301-311 [Journal]
  4. Guofei Jiang, Haifeng Chen, Kenji Yoshihira
    Modeling and Tracking of Transaction Flow Dynamics for Fault Detection in Complex Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:4, pp:312-326 [Journal]
  5. Angelo Ciaramella, Paolo D'Arco, Alfredo De Santis, Clemente Galdi, Roberto Tagliaferri
    Neural Network Techniques for Proactive Password Checking. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:4, pp:327-339 [Journal]
  6. Jiangtao Li, Ninghui Li
    OACerts: Oblivious Attribute Certificates. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:4, pp:340-352 [Journal]
  7. Vilas Sridharan, Hossein Asadi, Mehdi Baradaran Tahoori, David R. Kaeli
    Reducing Data Cache Susceptibility to Soft Errors. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:4, pp:353-364 [Journal]
  8. Krerk Piromsopa, Richard J. Enbody
    Secure Bit: Transparent, Hardware Buffer-Overflow Protection. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:4, pp:365-376 [Journal]
  9. Adnan Vora, Mikhail Nesterenko
    Secure Location Verification Using Radio Broadcast. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:4, pp:377-385 [Journal]
  10. Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
    Securing Mobile Ad Hoc Networks with Certificateless Public Keys. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:4, pp:386-399 [Journal]
  11. Jean-Philippe Martin, Lorenzo Alvisi
    Correction to "Fast Byzantine Consensus". [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:4, pp:400- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002