IEEE Transactions on Dependable and Secure Computing

短名IEEE Trans. Dependable and Secure Comput.
Journal Impact6.99
国际分区COMPUTER SCIENCE, SOFTWARE ENGINEERING(Q1)
期刊索引SCI Q1中科院 2 区
ISSN1545-5971, 1941-0018, 2160-9209
h-index100
国内分区计算机科学(2区)计算机科学计算机硬件(1区)计算机科学计算机信息系统(2区)计算机科学计算机软件工程(2区)

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (TDSC) 发表档案研究成果,重点研究支持通过设计、建模和评估实现所需程度的可靠和安全的系统和网络的基础、方法和机制在不影响性能的情况下。重点还包括测量、建模和仿真技术,以及联合评估、验证和设计性能、安全性和可靠性约束的基础。

期刊主页投稿网址
涉及主题计算机科学计算机安全操作系统计算机网络工程类数学程序设计语言法学政治学人工智能算法生物万维网物理
出版信息出版商: Institute of Electrical and Electronics Engineers Inc.出版周期: Quarterly期刊类型: journal
基本数据创刊年份: 2004原创研究文献占比100.00%自引率:5.70%Gold OA占比: 14.35%
平均审稿周期 网友分享经验:较慢,6-12周
平均录用比例网友分享经验:容易

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

DeFiRanger: Detecting DeFi Price Manipulation Attacks

2024-7-1

Privacy-Preserving and Energy-Saving Random Forest-Based Disease Detection Framework for Green Internet of Things in Mobile Healthcare Networks

2024-7-1

MalAF : Malware Attack Foretelling From Run-Time Behavior Graph Sequence

2024-7-1

On the Privacy of Multi-Versioned Approximate Membership Check Filters

2024-7-1

PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in Cloud

2024-7-1

RC-NVM: Recovery-Aware Reliability-Security Co-Design for Non-Volatile Memories

2024-7-1

Fast-HotStuff: A Fast and Robust BFT Protocol for Blockchains

2024-7-1

Evolutionary Dynamic Database Partitioning Optimization for Privacy and Utility

2024-7-1

ChildShield: An Implicit and Continuous Child Identification System on Smartphones

2024-7-1

Effectively Improving Data Diversity of Substitute Training for Data-Free Black-Box Attack

2024-7-1

${\sf MARS}$: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments

2024-7-1

Achieving Efficient and Privacy-Preserving Location-Based Task Recommendation in Spatial Crowdsourcing

2024-7-1

PUF for the Commons: Enhancing Embedded Security on the OS Level

2024-7-1

Highly Available Blockchain Nodes With N-Version Design

2024-7-1

Efficiently Supporting Attribute-based Access Control in Linux

2024-7-1

A Note on “efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision”

2024-7-1

SecureC2Edit: A Framework for Secure Collaborative and Concurrent Document Editing

2024-7-1

The Role of Class Information in Model Inversion Attacks against Image Deep Learning Classifiers

2024-7-1

SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid

2024-7-1

CMI: Client-Targeted Membership Inference in Federated Learning

2024-7-1

<i>MiniTracker</i>: Large-Scale Sensitive Information Tracking in Mini Apps

2024-7-1

GAIT: A Game-Theoretic Defense Against Intellectual Property Theft

2024-7-1

Reducing Malware Analysis Overhead with Coverings

2024-7-1

VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder

2024-7-1

On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic

2024-7-1

Disentangled Orchestration on Cyber Ranges

2024-7-1

Multi-Adjustable Join Schemes with Adaptive Indistinguishably Security

2024-7-1

Trusted Operations of a Military Ground Robot in the Face of Man-in-the-Middle Cyberattacks Using Deep Learning Convolutional Neural Networks: Real-Time Experimental Outcomes

2024-7-1

Practical EMI Attacks on Smartphones with Users' Commands Cancelled

2024-7-1

User Authentication on Earable Devices Via Bone-Conducted Occlusion Sounds

2024-7-1

DSChain: A Blockchain System for Complete Lifecycle Security of Data in Internet of Things

2024-7-1

Protecting Privacy in Knowledge Graphs With Personalized Anonymization

2024-7-1

Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild

2024-7-1

An Optimized Sparse Response Mechanism for Differentially Private Federated Learning

2024-7-1

Similarity-based Secure Deduplication for IIoT Cloud Management System

2024-7-1

Security-Minded Verification of Cooperative Awareness Messages

2024-7-1

Defending Video Recognition Model against Adversarial Perturbations via Defense Patterns

2024-7-1

Air-Gap Electromagnetic Covert Channel

2024-7-1

Exploiting Deep Neural Networks as Covert Channels

2024-7-1

On Tracing Screen Photos-A Moiré Pattern-based Approach

2024-7-1

Hardware-assisted Live Kernel Function Updating on Intel Platforms

2024-7-1

LogGraph: Log Event Graph Learning Aided Robust Fine-Grained Anomaly Diagnosis

2024-7-1

Communication and Energy Efficient Wireless Federated Learning With Intrinsic Privacy

2024-7-1

MODA: Model Ownership Deprivation Attack in Asynchronous Federated Learning

2024-7-1

Robust Asynchronous Federated Learning with Time-weighted and Stale Model Aggregation

2024-7-1

FedTA: Federated Worthy Task Assignment for Crowd Workers

2024-7-1

A Utility-aware Anonymization Model for Multiple Sensitive Attributes Based on Association Concealment

2024-7-1

IvyRedaction: Enabling Atomic, Consistent and Accountable Cross-Chain Rewriting

2024-7-1

IoTa: Fine-Grained Traffic Monitoring for IoT Devices via Fully Packet-Level Models

2024-7-1

False Data Detector for Electrical Vehicles Temporal-Spatial Charging Coordination Secure Against Evasion and Privacy Adversarial Attacks

2024-7-1

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司