skip to main content
Primo Advanced Search
Primo Advanced Search Query Term
Primo Advanced Search Query Term
Primo Advanced Search Query Term
Primo Advanced Search prefilters
Resultados 1 2 3 4 5 next page
Refinado por: Nome da Publicação: IEEE Transactions on Dependable and Secure Computing remover
Result Number Material Type Add to My Shelf Action Record Details and Options
1
EdgePro: Edge Deep Learning Model Protection via Neuron Authorization
Material Type:
Artigo
Adicionar ao Meu Espaço

EdgePro: Edge Deep Learning Model Protection via Neuron Authorization

Chen, Jinyin ; Zheng, Haibin ; Liu, Tao ; Liu, Jiawei ; Cheng, Yao ; Zhang, Xuhong ; Ji, Shouling

IEEE transactions on dependable and secure computing, 2024-09, Vol.21 (5), p.4967-4981

Washington: IEEE

Texto completo disponível

2
Solving the Workflow Satisfiability Problem using General Purpose Solvers
Material Type:
Artigo
Adicionar ao Meu Espaço

Solving the Workflow Satisfiability Problem using General Purpose Solvers

Karapetyan, Daniel ; Gutin, Gregory

IEEE transactions on dependable and secure computing, 2023-11, Vol.20 (6), p.1-12

Washington: IEEE

Texto completo disponível

3
TrinitySec: Trinity-Enabled and Lightweight Security Framework for CAN-FD Communication
Material Type:
Artigo
Adicionar ao Meu Espaço

TrinitySec: Trinity-Enabled and Lightweight Security Framework for CAN-FD Communication

Lu, Ruiqi ; Xie, Guoqi ; Li, Renfa ; Xu, Wei ; Lei, Jianmei

IEEE transactions on dependable and secure computing, 2024-07, Vol.21 (4), p.2704-2719

Washington: IEEE

Texto completo disponível

4
Leakage of Authorization-Data in IoT Device Sharing: New Attacks and Countermeasure
Material Type:
Artigo
Adicionar ao Meu Espaço

Leakage of Authorization-Data in IoT Device Sharing: New Attacks and Countermeasure

Yuan, Bin ; Yang, Maogen ; Xu, Zhen ; Chen, Qunjinming ; Song, Zhanxiang ; Li, Zhen ; Zou, Deqing ; Jin, Hai

IEEE transactions on dependable and secure computing, 2024-07, Vol.21 (4), p.3196-3210

Washington: IEEE

Texto completo disponível

5
Detecting Errors in NGAC Policies Via Fault-Based Testing
Material Type:
Artigo
Adicionar ao Meu Espaço

Detecting Errors in NGAC Policies Via Fault-Based Testing

Chen, Erzhuo ; Dubrovenski, Vlad ; Xu, Dianxiang

IEEE transactions on dependable and secure computing, 2024, p.1-16

IEEE

Texto completo disponível

6
Improving Prefix Hijacking Defense of RPKI from an Evolutionary Game Perspective
Material Type:
Artigo
Adicionar ao Meu Espaço

Improving Prefix Hijacking Defense of RPKI from an Evolutionary Game Perspective

Zeng, Man ; Huang, Xiaohong ; Zhang, Pei ; Li, Dandan ; Xie, Kun

IEEE transactions on dependable and secure computing, 2024, p.1-15

IEEE

Texto completo disponível

7
Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive Environments
Material Type:
Artigo
Adicionar ao Meu Espaço

Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive Environments

Yu, Alian ; Kang, Jian ; Jiang, Wei ; Lin, Dan

IEEE transactions on dependable and secure computing, 2024, p.1-12

IEEE

Texto completo disponível

8
Stochastic Workflow Authorizations With Queueing Constraints
Material Type:
Artigo
Adicionar ao Meu Espaço

Stochastic Workflow Authorizations With Queueing Constraints

Lu, Haibing ; Chen, Xi ; Liu, Qi ; Samorani, Michele ; Song, Guojie ; Yang, Yanjiang

IEEE transactions on dependable and secure computing, 2021-07, Vol.18 (4), p.1605-1619

Washington: IEEE

Texto completo disponível

9
Safety Decidability for Pre-Authorization Usage Control with Finite Attribute Domains
Material Type:
Artigo
Adicionar ao Meu Espaço

Safety Decidability for Pre-Authorization Usage Control with Finite Attribute Domains

Rajkumar, P.V. ; Sandhu, Ravi

IEEE transactions on dependable and secure computing, 2016-09, Vol.13 (5), p.582-590

Washington: IEEE

Texto completo disponível

10
An Automatic Attribute Based Access Control Policy Extraction from Access Logs
Material Type:
Artigo
Adicionar ao Meu Espaço

An Automatic Attribute Based Access Control Policy Extraction from Access Logs

Karimi, Leila ; Aldairi, Maryam ; Joshi, James ; Abdelhakim, Mai

IEEE transactions on dependable and secure computing, 2022-07, Vol.19 (4), p.1-1

Washington: IEEE

Texto completo disponível

Resultados 1 2 3 4 5 next page

Buscando em bases de dados remotas. Favor aguardar.