Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
EdgePro: Edge Deep Learning Model Protection via Neuron AuthorizationChen, Jinyin ; Zheng, Haibin ; Liu, Tao ; Liu, Jiawei ; Cheng, Yao ; Zhang, Xuhong ; Ji, ShoulingIEEE transactions on dependable and secure computing, 2024-09, Vol.21 (5), p.4967-4981Washington: IEEETexto completo disponível |
|
2 |
Material Type: Artigo
|
Solving the Workflow Satisfiability Problem using General Purpose SolversKarapetyan, Daniel ; Gutin, GregoryIEEE transactions on dependable and secure computing, 2023-11, Vol.20 (6), p.1-12Washington: IEEETexto completo disponível |
|
3 |
Material Type: Artigo
|
TrinitySec: Trinity-Enabled and Lightweight Security Framework for CAN-FD CommunicationLu, Ruiqi ; Xie, Guoqi ; Li, Renfa ; Xu, Wei ; Lei, JianmeiIEEE transactions on dependable and secure computing, 2024-07, Vol.21 (4), p.2704-2719Washington: IEEETexto completo disponível |
|
4 |
Material Type: Artigo
|
Leakage of Authorization-Data in IoT Device Sharing: New Attacks and CountermeasureYuan, Bin ; Yang, Maogen ; Xu, Zhen ; Chen, Qunjinming ; Song, Zhanxiang ; Li, Zhen ; Zou, Deqing ; Jin, HaiIEEE transactions on dependable and secure computing, 2024-07, Vol.21 (4), p.3196-3210Washington: IEEETexto completo disponível |
|
5 |
Material Type: Artigo
|
Detecting Errors in NGAC Policies Via Fault-Based TestingChen, Erzhuo ; Dubrovenski, Vlad ; Xu, DianxiangIEEE transactions on dependable and secure computing, 2024, p.1-16IEEETexto completo disponível |
|
6 |
Material Type: Artigo
|
Improving Prefix Hijacking Defense of RPKI from an Evolutionary Game PerspectiveZeng, Man ; Huang, Xiaohong ; Zhang, Pei ; Li, Dandan ; Xie, KunIEEE transactions on dependable and secure computing, 2024, p.1-15IEEETexto completo disponível |
|
7 |
Material Type: Artigo
|
Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive EnvironmentsYu, Alian ; Kang, Jian ; Jiang, Wei ; Lin, DanIEEE transactions on dependable and secure computing, 2024, p.1-12IEEETexto completo disponível |
|
8 |
Material Type: Artigo
|
Stochastic Workflow Authorizations With Queueing ConstraintsLu, Haibing ; Chen, Xi ; Liu, Qi ; Samorani, Michele ; Song, Guojie ; Yang, YanjiangIEEE transactions on dependable and secure computing, 2021-07, Vol.18 (4), p.1605-1619Washington: IEEETexto completo disponível |
|
9 |
Material Type: Artigo
|
Safety Decidability for Pre-Authorization Usage Control with Finite Attribute DomainsRajkumar, P.V. ; Sandhu, RaviIEEE transactions on dependable and secure computing, 2016-09, Vol.13 (5), p.582-590Washington: IEEETexto completo disponível |
|
10 |
Material Type: Artigo
|
An Automatic Attribute Based Access Control Policy Extraction from Access LogsKarimi, Leila ; Aldairi, Maryam ; Joshi, James ; Abdelhakim, MaiIEEE transactions on dependable and secure computing, 2022-07, Vol.19 (4), p.1-1Washington: IEEETexto completo disponível |