IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 1 > 128 - 134
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 1 > 125 - 127
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 1 > 85 - 97
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 1 > 16 - 30
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 1 > 45 - 57
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 1 > 71 - 84
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 1 > 31 - 44
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 1 > 58 - 70
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 1 > 1 - 15
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 1 > 111 - 124
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 1 > 98 - 110
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 2 > 179 - 189
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 2 > 204 - 216
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 2 > 190 - 203
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 2 > 135
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 2 > 243 - 255
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 2 > 136 - 149
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 2 > 150 - 163
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 2 > 164 - 178
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 2 > 230 - 242