IEEE Transactions on Dependable and Secure Computing
短名 | IEEE Trans. Dependable and Secure Comput. |
Journal Impact | 6.99 |
国际分区 | COMPUTER SCIENCE, SOFTWARE ENGINEERING(Q1) |
期刊索引 | SCI Q1中科院 2 区 |
ISSN | 1545-5971, 1941-0018, 2160-9209 |
h-index | 100 |
国内分区 | 计算机科学(2区)计算机科学计算机硬件(1区)计算机科学计算机信息系统(2区)计算机科学计算机软件工程(2区) |
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (TDSC) 发表档案研究成果,重点研究支持通过设计、建模和评估实现所需程度的可靠和安全的系统和网络的基础、方法和机制在不影响性能的情况下。重点还包括测量、建模和仿真技术,以及联合评估、验证和设计性能、安全性和可靠性约束的基础。
期刊主页投稿网址涉及主题 | 计算机科学计算机安全操作系统计算机网络工程类数学程序设计语言法学政治学人工智能算法生物万维网物理 |
出版信息 | 出版商: Institute of Electrical and Electronics Engineers Inc.,出版周期: Quarterly,期刊类型: journal |
基本数据 | 创刊年份: 2004,原创研究文献占比: 100.00%,自引率:5.70%, Gold OA占比: 14.35% |
平均审稿周期 | 网友分享经验:较慢,6-12周 |
平均录用比例 | 网友分享经验:容易 |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
最新文章
DeFiRanger: Detecting DeFi Price Manipulation Attacks
2024-7-1
Privacy-Preserving and Energy-Saving Random Forest-Based Disease Detection Framework for Green Internet of Things in Mobile Healthcare Networks
2024-7-1
MalAF : Malware Attack Foretelling From Run-Time Behavior Graph Sequence
2024-7-1
On the Privacy of Multi-Versioned Approximate Membership Check Filters
2024-7-1
PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in Cloud
2024-7-1
RC-NVM: Recovery-Aware Reliability-Security Co-Design for Non-Volatile Memories
2024-7-1
Fast-HotStuff: A Fast and Robust BFT Protocol for Blockchains
2024-7-1
Evolutionary Dynamic Database Partitioning Optimization for Privacy and Utility
2024-7-1
ChildShield: An Implicit and Continuous Child Identification System on Smartphones
2024-7-1
Effectively Improving Data Diversity of Substitute Training for Data-Free Black-Box Attack
2024-7-1
${\sf MARS}$: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments
2024-7-1
Achieving Efficient and Privacy-Preserving Location-Based Task Recommendation in Spatial Crowdsourcing
2024-7-1
PUF for the Commons: Enhancing Embedded Security on the OS Level
2024-7-1
Highly Available Blockchain Nodes With N-Version Design
2024-7-1
Efficiently Supporting Attribute-based Access Control in Linux
2024-7-1
A Note on “efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision”
2024-7-1
SecureC2Edit: A Framework for Secure Collaborative and Concurrent Document Editing
2024-7-1
The Role of Class Information in Model Inversion Attacks against Image Deep Learning Classifiers
2024-7-1
SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid
2024-7-1
CMI: Client-Targeted Membership Inference in Federated Learning
2024-7-1
<i>MiniTracker</i>: Large-Scale Sensitive Information Tracking in Mini Apps
2024-7-1
GAIT: A Game-Theoretic Defense Against Intellectual Property Theft
2024-7-1
Reducing Malware Analysis Overhead with Coverings
2024-7-1
VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder
2024-7-1
On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic
2024-7-1
Disentangled Orchestration on Cyber Ranges
2024-7-1
Multi-Adjustable Join Schemes with Adaptive Indistinguishably Security
2024-7-1
Trusted Operations of a Military Ground Robot in the Face of Man-in-the-Middle Cyberattacks Using Deep Learning Convolutional Neural Networks: Real-Time Experimental Outcomes
2024-7-1
Practical EMI Attacks on Smartphones with Users' Commands Cancelled
2024-7-1
User Authentication on Earable Devices Via Bone-Conducted Occlusion Sounds
2024-7-1
DSChain: A Blockchain System for Complete Lifecycle Security of Data in Internet of Things
2024-7-1
Protecting Privacy in Knowledge Graphs With Personalized Anonymization
2024-7-1
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild
2024-7-1
An Optimized Sparse Response Mechanism for Differentially Private Federated Learning
2024-7-1
Similarity-based Secure Deduplication for IIoT Cloud Management System
2024-7-1
Security-Minded Verification of Cooperative Awareness Messages
2024-7-1
Defending Video Recognition Model against Adversarial Perturbations via Defense Patterns
2024-7-1
Air-Gap Electromagnetic Covert Channel
2024-7-1
Exploiting Deep Neural Networks as Covert Channels
2024-7-1
On Tracing Screen Photos-A Moiré Pattern-based Approach
2024-7-1
Hardware-assisted Live Kernel Function Updating on Intel Platforms
2024-7-1
LogGraph: Log Event Graph Learning Aided Robust Fine-Grained Anomaly Diagnosis
2024-7-1
Communication and Energy Efficient Wireless Federated Learning With Intrinsic Privacy
2024-7-1
MODA: Model Ownership Deprivation Attack in Asynchronous Federated Learning
2024-7-1
Robust Asynchronous Federated Learning with Time-weighted and Stale Model Aggregation
2024-7-1
FedTA: Federated Worthy Task Assignment for Crowd Workers
2024-7-1
A Utility-aware Anonymization Model for Multiple Sensitive Attributes Based on Association Concealment
2024-7-1
IvyRedaction: Enabling Atomic, Consistent and Accountable Cross-Chain Rewriting
2024-7-1
IoTa: Fine-Grained Traffic Monitoring for IoT Devices via Fully Packet-Level Models
2024-7-1
False Data Detector for Electrical Vehicles Temporal-Spatial Charging Coordination Secure Against Evasion and Privacy Adversarial Attacks
2024-7-1
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远