The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 06 - Nov.-Dec. (vol. 9)
ISSN: 1545-5971
PAPERS

A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless Multimedia Sensor Networks (Abstract)

Sajal K. Das , The University of Texas at Arlington. Arlington
Hong Luo , Beijing University of Posts and Telecommunications, Beijing
Yan Sun , Beijing University of Posts and Telecommunications, Beijing
pp. 785-797

Attacks and Defenses in the Data Plane of Networks (Abstract)

Tilman Wolf , University of Massachusetts, Amherst
Danai Chasaki , University of Massachusetts, Amherst
pp. 798-810

Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? (Abstract)

Sushil Jajodia , George Mason University, Fairfax
Haining Wang , College of William and Mary, Williamsburg
Steven Gianvecchio , MITRE Corporation, McLean
Zi Chu , Twitter Inc., San Francisco
pp. 811-824

Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks (Abstract)

Mathias Ekstedt , The Royal Institute of Technology, Stockholm
Hannes Holm , The Royal Institute of Technology, Stockholm
Dennis Andersson , Swedish Defence Research Agency, Linköping
pp. 825-837

Enhancing Data Trustworthiness via Assured Digital Signing (Abstract)

Hai Jin , Huazhong University of Science and Technology, Wuhan
Shouhuai Xu , University of Texas at San Antonio, San Antonio
T. Paul Parker , Dallas Baptist University and University of Texas at San Antonio, San Antonio
Weiqi Dai , Huazhong University of Science and Technology, Wuhan and University of Texas at San Antonio, San Antonio
pp. 838-851

Jamming-Resilient Multipath Routing (Abstract)

Adrian Perrig , Carnegie Mellon University, Pittsburgh
Wenyuan Xu , University of South Carolina, Columbia
Zhenhua Liu , University of South Carolina, Columbia
Xin Zhang , Carnegie Mellon University, Pittsburgh
Hossen Mustafa , University of South Carolina, Columbia
pp. 852-864

On Energy Security of Server Systems (Abstract)

Haining Wang , College of William and Mary, Williamsburg
Mengjun Xie , University of Arkansas at Little Rock, Little Rock
Zhenyu Wu , College of William and Mary, Williamsburg
pp. 865-876

Preserving Structural Properties in Edge-Perturbing Anonymization Techniques for Social Networks (Abstract)

James Joshi , University of Pittsburgh, Pittsburgh
Amirreza Masoumzadeh , University of Pittsburgh, Pittsburgh
pp. 877-889

Robust Network Covert Communications Based on TCP and Enumerative Combinatorics (Abstract)

Peng Zhou , The Hong Kong Polytechnic University, Hong Kong
Rocky K.C. Chang , The Hong Kong Polytechnic University, Hong Kong
Edmond W.W. Chan , The Hong Kong Polytechnic University, Hong Kong
Xiapu Luo , The Hong Kong Polytechnic University, Hong Kong
pp. 890-902

Secure Overlay Cloud Storage with Access Control and Assured Deletion (Abstract)

John C.S. Lui , The Chinese University of Hong Kong, Hong Kong
Patrick P.C. Lee , The Chinese University of Hong Kong, Hong Kong
Yang Tang , The Chinese University of Hong Kong, Hong Kong
Radia Perlman , Intel Labs, Santa Clara
pp. 903-916

Surviving Attacks in Challenged Networks (Abstract)

Simin Nadjm-Tehrani , Linköping University, Linköping
Mikael Asplund , Linköping University, Linköping
Jordi Cucurull , Linköping University, Linköping
Tiziano Santoro , Linköping University, Linköping
pp. 917-929

Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviors (Abstract)

Sadie Creese , University of Oxford, Oxford
Jennifer T. Jackson , University of Warwick, Coventry
pp. 930-943
CALL FOR PAPERS

TDSC Call for Papers (PDF)

pp. 944
84 ms
(Ver )