IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 1 > 65 - 82
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 1 > 83 - 94
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 1 > 37 - 49
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 1 > 2 - 8
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 1 > 9 - 21
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 1 > 50 - 64
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 1 > 95 - 108
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 1 > 22 - 36
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 2 > 158 - 171
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 2 > 221 - 234
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 2 > 145 - 157
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 2 > 199 - 210
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 2 > 172 - 184
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 2 > 116 - 129
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 2 > 130 - 144
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 2 > 211 - 220
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 2 > 185 - 198