By Topic

IEEE Transactions on Dependable and Secure Computing

Issue 1 • Jan.-March 2008

Filter Results

Displaying Results 1 - 13 of 13
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2008, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Editorial: Dependability and Security

    Publication Year: 2008, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (143 KB) | HTML iconHTML
    Freely Available from IEEE
  • Editorial

    Publication Year: 2008, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (100 KB) | HTML iconHTML
    Freely Available from IEEE
  • A Precise Termination Condition of the Probabilistic Packet Marking Algorithm

    Publication Year: 2008, Page(s):6 - 21
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3659 KB) | HTML iconHTML

    The probabilistic packet marking (PPM) algorithm is a promising way to discover the Internet map or an attack graph that the attack packets traversed during a distributed denial-of-service attack. However, the PPM algorithm is not perfect, as its termination condition is not well defined in the literature. More importantly, without a proper termination condition, the attack graph constructed by th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controlling IP Spoofing through Interdomain Packet Filters

    Publication Year: 2008, Page(s):22 - 36
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2803 KB) | HTML iconHTML

    The distributed denial-of-service (DDoS) attack is a serious threat to the legitimate use of the Internet. Prevention mechanisms are thwarted by the ability of attackers to forge or spoof the source addresses in IP packets. By employing IP spoofing, attackers can evade detection and put a substantial burden on the destination network for policing attack packets. In this paper, we propose an interd... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Credit Card Fraud Detection Using Hidden Markov Model

    Publication Year: 2008, Page(s):37 - 48
    Cited by:  Papers (44)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3114 KB) | HTML iconHTML

    Due to a rapid advancement in the electronic commerce technology, the use of credit cards has dramatically increased. As credit card becomes the most popular mode of payment for both online as well as regular purchase, cases of fraud associated with it are also rising. In this paper, we model the sequence of operations in credit card transaction processing using a hidden Markov model (HMM) and sho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trustworthy Computing under Resource Constraints with the DOWN Policy

    Publication Year: 2008, Page(s):49 - 61
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (501 KB) | HTML iconHTML

    Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use today, albeit limited predominantly to scenarios where constraints on cost is not a serious limiting factor. However, inexpensive trustworthy computers are required for many evolving application scenarios. The problem of realizing inexpensive ScPs for large-scale networks consisting of low-complexity devices ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2007 Reviewers List

    Publication Year: 2008, Page(s):62 - 63
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • Society Journals Seek Editors in Chief for 2009-2010 Terms

    Publication Year: 2008, Page(s): 64
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • 2007 Annual Index

    Publication Year: 2008, Page(s): Not In Print
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • TDSC Information for authors

    Publication Year: 2008, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2008, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University