IEEE 2012 Projects :: Dependable and Secure Computing – Titles & Abstracts
Regular IEEE Projectlist Updates… Subscribe Now…
IEEE Titles 2012 :: Dependable and Secure Computing
1 |
A Flexible Approach to Improving System Reliability with Virtual Lockstep |
2 |
A Flexible Approach to Multisession Trust Negotiations |
3 |
A Learning-Based Approach to Reactive Security |
4 |
A Stochastic Model of Multivirus Dynamics |
5 |
A Taxonomy of Buffer Overflow Characteristics |
6 |
Automated Security Test Generation with Formal Threat Models |
7 |
Automatic Reconfiguration for Large-Scale Reliable Storage Systems |
8 |
Compiler-Directed Soft Error Mitigation for Embedded Systems |
9 |
Conditional Diagnosability of Augmented Cubes under the PMC Model |
10 |
Data-Provenance Verification For Secure Hosts |
11 |
Design and Implementation of TARF:A Trust-Aware Routing Framework for WSNs |
12 |
Detecting and Resolving Firewall Policy Anomalies |
13 |
Detecting Anomalous Insiders in Collaborative Information Systems |
14 |
Detecting Spam Zombies by Monitoring Outgoing Messages |
15 |
Double Guard: Detecting Intrusions in Multitier Web Applications |
16 |
Dynamic Security Risk Management Using Bayesian Attack Graphs |
17 |
Enforcing Mandatory Access Control in Commodity OS to Disable Malware |
18 |
Enforcing Mandatory Access Control in Commodity OS to Disable Malware |
19 |
Ensuring Distributed Accountability for Data Sharing in the Cloud |
20 |
ES-MPICH2: A Message Passing Interface with Enhanced Security |
21 |
Extending Attack Graph-Based Security Metrics and Aggregating Their Application |
22 |
Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals |
23 |
Incentive Compatible Privacy-Preserving Distributed Classification |
24 |
Iterative Trust and Reputation Management Using Belief Propagation |
25 |
JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks |
26 |
Large Margin Gaussian Mixture Models with Differential Privacy |
27 |
Low Energy Online Self-Test of Embedded Processors in Dependable WSN Nodes |
28 |
Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts |
29 |
M-Score: A Misuseability Weight Measure |
30 |
On Privacy of Encrypted Speech Communications |
31 |
On the Security and Efficiency of Content Distribution via Network Coding |
32 |
On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks |
33 |
Packet-Hiding Methods for Preventing Selective Jamming Attacks |
34 |
pCloud: A Distributed System for Practical PIR |
35 |
Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism |
36 |
Quantitative Analysis of Consensus Algorithms |
37 |
Recommendation Models for Open Authorization |
38 |
Remote Attestation with Domain-Based Integrity Model and Policy Analysis |
39 |
Resilient Authenticated Execution of Critical Applications in Untrusted Environments |
40 |
Revisiting Defenses against Large-Scale Online Password Guessing Attacks |
41 |
Risk-Aware Mitigation for MANET Routing Attacks |
42 |
Secure Failure Detection and Consensus in Trusted Pals |
43 |
Secured Trust: A Dynamic Trust Computation Model for Secured Communication in Multi agent Systems |
44 |
Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting |
45 |
Stabilization Enabling Technology |
46 |
Survivability Experiment and Attack Characterization for RFID |
47 |
Zone Trust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing |