2018 IEEE Conference on Dependable and Secure Computing (DSC)

10-13 Dec. 2018

Filter Results

Displaying Results 1 - 25 of 76
  • Copyright

    Publication Year: 2018, Page(s): 2
    Request permission for reuse | PDF file iconPDF (463 KB)
    Freely Available from IEEE
  • Cover

    Publication Year: 2018, Page(s): 1
    Request permission for reuse | PDF file iconPDF (951 KB)
    Freely Available from IEEE
  • DSC#1

    Publication Year: 2018, Page(s): 21
    Request permission for reuse | PDF file iconPDF (611 KB)
    Freely Available from IEEE
  • DSC#2

    Publication Year: 2018, Page(s): 54
    Request permission for reuse | PDF file iconPDF (612 KB)
    Freely Available from IEEE
  • DSC#3

    Publication Year: 2018, Page(s): 81
    Request permission for reuse | PDF file iconPDF (609 KB)
    Freely Available from IEEE
  • DSC#4

    Publication Year: 2018, Page(s): 122
    Request permission for reuse | PDF file iconPDF (612 KB)
    Freely Available from IEEE
  • DSC#5

    Publication Year: 2018, Page(s): 156
    Request permission for reuse | PDF file iconPDF (608 KB)
    Freely Available from IEEE
  • DSC#6

    Publication Year: 2018, Page(s): 163
    Request permission for reuse | PDF file iconPDF (609 KB)
    Freely Available from IEEE
  • DSC#7

    Publication Year: 2018, Page(s): 204
    Request permission for reuse | PDF file iconPDF (613 KB)
    Freely Available from IEEE
  • Experience and Practice

    Publication Year: 2018, Page(s): 10
    Request permission for reuse | PDF file iconPDF (606 KB)
    Freely Available from IEEE
  • Keynote Talk #1

    Publication Year: 2018, Page(s): 13
    Request permission for reuse | PDF file iconPDF (472 KB)
    Freely Available from IEEE
  • Keynote Talk #2

    Publication Year: 2018, Page(s): 14
    Request permission for reuse | PDF file iconPDF (695 KB)
    Freely Available from IEEE
  • Manuscript Format

    Publication Year: 2018, Page(s): 11
    Request permission for reuse | PDF file iconPDF (465 KB)
    Freely Available from IEEE
  • Organization

    Publication Year: 2018, Page(s):4 - 7
    Request permission for reuse | PDF file iconPDF (894 KB)
    Freely Available from IEEE
  • Overiew

    Publication Year: 2018, Page(s): 8
    Request permission for reuse | PDF file iconPDF (460 KB)
    Freely Available from IEEE
  • Regular Track: Computer Systems, Networks and Software/Hardware

    Publication Year: 2018, Page(s): 9
    Request permission for reuse | PDF file iconPDF (606 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2018, Page(s): 3
    Request permission for reuse | PDF file iconPDF (2298 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2018, Page(s):15 - 20
    Request permission for reuse | PDF file iconPDF (1659 KB)
    Freely Available from IEEE
  • Tenntative Conference Program

    Publication Year: 2018, Page(s): 12
    Request permission for reuse | PDF file iconPDF (796 KB)
    Freely Available from IEEE
  • Workshop#1

    Publication Year: 2018, Page(s): 237
    Request permission for reuse | PDF file iconPDF (614 KB)
    Freely Available from IEEE
  • Workshop#2

    Publication Year: 2018, Page(s): 273
    Request permission for reuse | PDF file iconPDF (612 KB)
    Freely Available from IEEE
  • Workshop#3

    Publication Year: 2018, Page(s): 301
    Request permission for reuse | PDF file iconPDF (609 KB)
    Freely Available from IEEE
  • Workshop#4

    Publication Year: 2018, Page(s): 335
    Request permission for reuse | PDF file iconPDF (609 KB)
    Freely Available from IEEE
  • ANN Mechanism for Network Traffic Anomaly Detection in the Concept Drifting Environment

    Publication Year: 2018, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    For timely and effectively detecting the anomalous network traffic, this study proposes an ANN-based machine-learning algorithm that is able to detect abnormal network traffic in the concept-drifting environment. For exploring the timeliness and effectiveness, this study sets up an experiment with a set of real network traffic data provided by Research Center for Information Technology Innovation,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Bandwidth-Efficient Middleware for Encrypted Deduplication

    Publication Year: 2018, Page(s):1 - 8
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1281 KB) | HTML iconHTML

    Data deduplication is a vital component of current cloud storage systems for optimized space utilization. However, users cannot fairly enjoy the storage savings of deduplication. Uploading two identical files consumes twice the storage quota from a user's account, but the server may store one file copy only. In this paper, we design and implement a middleware system, namely UWare. It brings storag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.