Research & Development Division
Call Us Free: 1-800-103-2221

IEEE 2012 Projects | Dependable and Secure Computing

IEEE 2012 Projects :: Dependable and Secure Computing – Titles & Abstracts


[download file=”http://elysiumtechnologies.info/pdf2011-2012/Data%20Mining.pdf” title=”Get IEEE Abstract 2012 :: Dependable and Secure Computing”]



Regular IEEE Projectlist Updates… Subscribe Now…

[wpmlsubscribe type=”list” id=”2″]



IEEE Titles 2012 :: Dependable and Secure Computing

1

A Flexible Approach to Improving System Reliability with Virtual Lockstep

2

A Flexible Approach to Multisession Trust Negotiations

3

A Learning-Based Approach to Reactive Security

4

A Stochastic Model of Multivirus Dynamics

5

A Taxonomy of Buffer Overflow Characteristics

6

Automated Security Test Generation with Formal Threat Models

7

Automatic Reconfiguration for Large-Scale Reliable Storage Systems

8

Compiler-Directed Soft Error Mitigation for Embedded Systems

9

Conditional Diagnosability of Augmented Cubes under the PMC Model

10

Data-Provenance Verification For Secure Hosts

11

Design and Implementation of TARF:A Trust-Aware Routing Framework for WSNs

12

Detecting and Resolving Firewall Policy Anomalies

13

Detecting Anomalous Insiders in Collaborative Information Systems

14

Detecting Spam Zombies by Monitoring Outgoing Messages

15

Double Guard: Detecting Intrusions in Multitier Web Applications

16

Dynamic Security Risk Management Using Bayesian Attack Graphs

17

Enforcing Mandatory Access Control in Commodity OS to Disable Malware

18

Enforcing Mandatory Access Control in Commodity OS to Disable Malware

19

Ensuring Distributed Accountability for Data Sharing in the Cloud

20

ES-MPICH2: A Message Passing Interface with Enhanced Security

21

Extending Attack Graph-Based Security Metrics and Aggregating Their Application

22

Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals

23

Incentive Compatible Privacy-Preserving Distributed Classification

24

Iterative Trust and Reputation Management Using Belief Propagation

25

JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks

26

Large Margin Gaussian Mixture Models with Differential Privacy

27

Low Energy Online Self-Test of Embedded Processors in Dependable WSN Nodes

28

Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts

29

M-Score: A Misuseability Weight Measure

30

On Privacy of Encrypted Speech Communications

31

On the Security and Efficiency of Content Distribution via Network Coding

32

On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks

33

Packet-Hiding Methods for Preventing Selective Jamming Attacks

34

pCloud: A Distributed System for Practical PIR

35

Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism

36

Quantitative Analysis of Consensus Algorithms

37

Recommendation Models for Open Authorization

38

Remote Attestation with Domain-Based Integrity Model and Policy Analysis

39

Resilient Authenticated Execution of Critical Applications in Untrusted Environments

40

Revisiting Defenses against Large-Scale Online Password Guessing Attacks

41

Risk-Aware Mitigation for MANET Routing Attacks

42

Secure Failure Detection and Consensus in Trusted Pals

43

Secured Trust: A Dynamic Trust Computation Model for Secured Communication in  Multi agent Systems

44

Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting

45

Stabilization Enabling Technology

46

Survivability Experiment and Attack Characterization for RFID

47

Zone Trust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing

april, 2018

Sort Options

No Events

Latest Posts

Login Form

Get it Now! 5000+ IEEE Project Lists

Elysium feels proud in building strategic long-term relationships with the clients across worldwide. We believe that the best solutions evolve from the collaborative relationships with our clients. As a global consultant, we work closely with the clients to understand their unique business transformation goals, design best-in-class solutions and devise the most efficient plan for implementing their strategy across the organization.

Our ETPL is renowned for our reputed services in offering real time projects for the students of engineering and science stream. Our prime motto is to fulfill the needs of the students in every aspect of our work. We also extend our guidance services to the research scholars.

  • No.1 : Project Leader in India
  • 1,00,000 Sucessive Stories
  • 100% Satisfaction
  • 100% Privacy
  • 5000+ IEEE Project Titles
  • Qualified Staff Members
  • 24/7 Help Desk Support
Close this popup

Your Information will never be shared

Your Name
Your Mobile Number
Your E-Mail ID
*All information provided will be kept confidential.
*Terms & Conditions Apply
Your Name
Your Mobile Number
Your E-Mail ID
*All information provided will be kept confidential.
*Terms & Conditions Apply
Your Name
Your Mobile Number
Your E-Mail ID
*All information provided will be kept confidential.
*Terms & Conditions Apply
LiveZilla Live Chat Software