Advanced Search 
IEEE Transactions on Dependable and Secure Computing
May/June 2012 (vol. 9 no. 3)
ISSN: 1545-5971
Table of Contents
Papers
Matt Bishop, University of California, Davis, Davis
Sophie Engle, University of San Francisco, San Francisco
Damien Howard, Northwestern University School of Law, Chicago
Sean Whalen, University of California, Davis, Davis and Lawrence Berkeley National Laboratory, Berkeley
pp. 305-317
Hongxin Hu, Arizona State University, Tempe
Gail-Joon Ahn, Arizona State University, Tempe
Ketan Kulkarni, Emerson Network Power, USA
pp. 318-331
You Chen, Vanderbilt University, Nashville
Steve Nyemba, Vanderbilt University, Nashville
Bradley Malin, Vanderbilt University, Nashville
pp. 332-344
Xiaojun Ruan, West Chester University of Pennsylvania, PA
Qing Yang, Montana State University, MT
Mohammed I. Alghamdi, Al-Baha University, Al-Baha City
Shu Yin, Auburn University, Auburn
Xiao Qin, Auburn University, Auburn
pp. 361-374
Erman Ayday, Georgia Institute of Technology, Atlanta
Faramarz Fekri, Georgia Institute of Technology, Atlanta
pp. 375-386
Daniele Riboni, University of Milan, Milano
Linda Pareschi, University of Milan, Milano
Claudio Bettini, University of Milan, Milano
pp. 387-400
Zhang Fu, Chalmers University of Technology, Gothenborg
Marina Papatriantafilou, Chalmers University of Technology, Gothenborg
Philippas Tsigas, Chalmers University of Technology, Gothenborg
pp. 401-413
Amir Harel, Ben Gurion University of the Negev, Beer-Sheva
Asaf Shabtai, Ben Gurion University of the Negev, Beer-Sheva
Lior Rokach, Ben Gurion University of the Negev, Beer-Sheva
Yuval Elovici, Ben Gurion University of the Negev, Beer-Sheva
pp. 414-428
Wenjuan Xu, Frostburg State University, Frostburg
Xinwen Zhang, Huawei Research Center, Santa Clara
Hongxin Hu, Arizona State University, Tempe
Gail-Joon Ahn, Arizona State University, Tempe
Jean-Pierre Seifert, Technical University of Berlin, Berlin
pp. 429-442
Comments
Huaqun Wang, Dalian Ocean University, Dalian
Yuqing Zhang, National Computer Network Intrusion Protection Center, GUCAS, Beijing,
pp. 443-446
Usage of this product signifies your acceptance of the Terms of Use.