Example of IEEE Transactions on Dependable and Secure Computing format
Recent searches

Example of IEEE Transactions on Dependable and Secure Computing format Example of IEEE Transactions on Dependable and Secure Computing format Example of IEEE Transactions on Dependable and Secure Computing format Example of IEEE Transactions on Dependable and Secure Computing format Example of IEEE Transactions on Dependable and Secure Computing format Example of IEEE Transactions on Dependable and Secure Computing format Example of IEEE Transactions on Dependable and Secure Computing format
Sample paper formatted on SciSpace - SciSpace
This content is only for preview purposes. The original open access content can be found here.
Look Inside
Example of IEEE Transactions on Dependable and Secure Computing format Example of IEEE Transactions on Dependable and Secure Computing format Example of IEEE Transactions on Dependable and Secure Computing format Example of IEEE Transactions on Dependable and Secure Computing format Example of IEEE Transactions on Dependable and Secure Computing format Example of IEEE Transactions on Dependable and Secure Computing format Example of IEEE Transactions on Dependable and Secure Computing format
Sample paper formatted on SciSpace - SciSpace
This content is only for preview purposes. The original open access content can be found here.
open access Open Access
recommended Recommended

IEEE Transactions on Dependable and Secure Computing — Template for authors

Publisher: IEEE
Categories Rank Trend in last 3 yrs
Computer Science (all) #7 of 226 down down by None rank
Electrical and Electronic Engineering #31 of 693 up up by 26 ranks
journal-quality-icon Journal quality:
High
calendar-icon Last 4 years overview: 283 Published Papers | 3927 Citations
indexed-in-icon Indexed in: Scopus
last-updated-icon Last updated: 19/07/2020
Related journals
Insights
General info
Top papers
Popular templates
Get started guide
Why choose from SciSpace
FAQ

Related Journals

open access Open Access

Hindawi

Quality:  
High
CiteRatio: 3.9
SJR: 0.318
SNIP: 0.926
open access Open Access
recommended Recommended

IEEE

Quality:  
High
CiteRatio: 15.5
SJR: 3.038
SNIP: 7.166
open access Open Access
recommended Recommended

IEEE

Quality:  
High
CiteRatio: 21.6
SJR: 2.383
SNIP: 4.671
open access Open Access

IEEE

Quality:  
Good
CiteRatio: 2.0
SJR: 0.251
SNIP: 0.553

Journal Performance & Insights

Impact Factor

CiteRatio

Determines the importance of a journal by taking a measure of frequency with which the average article in a journal has been cited in a particular year.

A measure of average citations received per peer-reviewed paper published in the journal.

6.864

7% from 2018

Impact factor for IEEE Transactions on Dependable and Secure Computing from 2016 - 2019
Year Value
2019 6.864
2018 6.404
2017 4.41
2016 2.926
graph view Graph view
table view Table view

13.9

16% from 2019

CiteRatio for IEEE Transactions on Dependable and Secure Computing from 2016 - 2020
Year Value
2020 13.9
2019 12.0
2018 9.3
2017 7.3
2016 6.6
graph view Graph view
table view Table view

insights Insights

  • Impact factor of this journal has increased by 7% in last year.
  • This journal’s impact factor is in the top 10 percentile category.

insights Insights

  • CiteRatio of this journal has increased by 16% in last years.
  • This journal’s CiteRatio is in the top 10 percentile category.

SCImago Journal Rank (SJR)

Source Normalized Impact per Paper (SNIP)

Measures weighted citations received by the journal. Citation weighting depends on the categories and prestige of the citing journal.

Measures actual citations received relative to citations expected for the journal's category.

1.274

17% from 2019

SJR for IEEE Transactions on Dependable and Secure Computing from 2016 - 2020
Year Value
2020 1.274
2019 1.531
2018 0.898
2017 0.802
2016 0.758
graph view Graph view
table view Table view

3.236

6% from 2019

SNIP for IEEE Transactions on Dependable and Secure Computing from 2016 - 2020
Year Value
2020 3.236
2019 3.433
2018 3.07
2017 2.701
2016 2.608
graph view Graph view
table view Table view

insights Insights

  • SJR of this journal has decreased by 17% in last years.
  • This journal’s SJR is in the top 10 percentile category.

insights Insights

  • SNIP of this journal has decreased by 6% in last years.
  • This journal’s SNIP is in the top 10 percentile category.

IEEE Transactions on Dependable and Secure Computing

Guideline source: View

All company, product and service names used in this website are for identification purposes only. All product names, trademarks and registered trademarks are property of their respective owners.

Use of these names, trademarks and brands does not imply endorsement or affiliation. Disclaimer Notice

IEEE

IEEE Transactions on Dependable and Secure Computing

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems;...... Read More

Engineering

i
Last updated on
19 Jul 2020
i
ISSN
1545-5971
i
Impact Factor
Very High - 3.022
i
Open Access
No
i
Sherpa RoMEO Archiving Policy
Green faq
i
Plagiarism Check
Available via Turnitin
i
Endnote Style
Download Available
i
Bibliography Name
IEEEtran
i
Citation Type
Numbered
[25]
i
Bibliography Example
C. W. J. Beenakker, “Specular andreev reflection in graphene,” Phys. Rev. Lett., vol. 97, no. 6, p.

Top papers written in this journal

open accessOpen access Journal Article DOI: 10.1109/TDSC.2004.2
Basic concepts and taxonomy of dependable and secure computing
Algirdas Avizienis1, Jean-Claude Laprie2, Brian Randell3, Carl E. Landwehr

Abstract:

This paper gives the main definitions relating to dependability, a generic concept including a special case of such attributes as reliability, availability, safety, integrity, maintainability, etc. Security brings in concerns for confidentiality, in addition to availability and integrity. Basic definitions are given first. Th... This paper gives the main definitions relating to dependability, a generic concept including a special case of such attributes as reliability, availability, safety, integrity, maintainability, etc. Security brings in concerns for confidentiality, in addition to availability and integrity. Basic definitions are given first. They are then commented upon, and supplemented by additional definitions, which address the threats to dependability and security (faults, errors, failures), their attributes, and the means for their achievement (fault prevention, fault tolerance, fault removal, fault forecasting). The aim is to explicate a set of general concepts, of relevance across a wide range of situations and, therefore, helping communication and cooperation among a number of scientific and technical communities, including ones that are concentrating on particular types of system, of system failures, or of causes of system failures. read more read less

Topics:

Dependability (66%)66% related to the paper, Fault tolerance (53%)53% related to the paper
View PDF
4,695 Citations
Journal Article DOI: 10.1109/TDSC.2016.2616861
Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams

Abstract:

Smart grids equipped with bi-directional communication flow are expected to provide more sophisticated consumption monitoring and energy trading. However, the issues related to the security and privacy of consumption and trading data present serious challenges. In this paper we address the problem of providing transaction sec... Smart grids equipped with bi-directional communication flow are expected to provide more sophisticated consumption monitoring and energy trading. However, the issues related to the security and privacy of consumption and trading data present serious challenges. In this paper we address the problem of providing transaction security in decentralized smart grid energy trading without reliance on trusted third parties. We have implemented a proof-of-concept for decentralized energy trading system using blockchain technology, multi-signatures, and anonymous encrypted messaging streams, enabling peers to anonymously negotiate energy prices and securely perform trading transactions. We conducted case studies to perform security analysis and performance evaluation within the context of the elicited security and privacy requirements. read more read less

Topics:

Information privacy (60%)60% related to the paper, Smart grid (52%)52% related to the paper, Security analysis (52%)52% related to the paper
837 Citations
open accessOpen access Journal Article DOI: 10.1109/TDSC.2005.26
Remote physical device fingerprinting
Tadayoshi Kohno1, Andre Broido2, kc claffy2

Abstract:

We introduce the area of remote physical device fingerprinting, or fingerprinting a physical device, as opposed to an operating system or class of devices, remotely, and without the fingerprinted device's known cooperation. We accomplish this goal by exploiting small, microscopic deviations in device hardware: clock skews. Ou... We introduce the area of remote physical device fingerprinting, or fingerprinting a physical device, as opposed to an operating system or class of devices, remotely, and without the fingerprinted device's known cooperation. We accomplish this goal by exploiting small, microscopic deviations in device hardware: clock skews. Our techniques do not require any modification to the fingerprinted devices. Our techniques report consistent measurements when the measurer is thousands of miles, multiple hops, and tens of milliseconds away from the fingerprinted device and when the fingerprinted device is connected to the Internet from different locations and via different access technologies. Further, one can apply our passive and semipassive techniques when the fingerprinted device is behind a NAT or firewall, and. also when the device's system time is maintained via NTP or SNTP. One can use our techniques to obtain information about whether two devices on the Internet, possibly shifted in time or IP addresses, are actually the same physical device. Example applications include: computer forensics; tracking, with some probability, a physical device as it connects to the Internet from different public access points; counting the number of devices behind a NAT even when the devices use constant or random IP IDs; remotely probing a block of addresses to determine if the addresses correspond to virtual hosts, e.g., as part of a virtual honeynet; and unanonymizing anonymized network traces. read more read less
View PDF
770 Citations
Journal Article DOI: 10.1109/TDSC.2012.75
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
Zi Chu1, Steven Gianvecchio2, Haining Wang3, Sushil Jajodia4

Abstract:

Twitter is a new web application playing dual roles of online social networking and microblogging. Users communicate with each other by publishing text-based posts. The popularity and open structure of Twitter have attracted a large number of automated programs, known as bots, which appear to be a double-edged sword to Twitte... Twitter is a new web application playing dual roles of online social networking and microblogging. Users communicate with each other by publishing text-based posts. The popularity and open structure of Twitter have attracted a large number of automated programs, known as bots, which appear to be a double-edged sword to Twitter. Legitimate bots generate a large amount of benign tweets delivering news and updating feeds, while malicious bots spread spam or malicious contents. More interestingly, in the middle between human and bot, there has emerged cyborg referred to either bot-assisted human or human-assisted bot. To assist human users in identifying who they are interacting with, this paper focuses on the classification of human, bot, and cyborg accounts on Twitter. We first conduct a set of large-scale measurements with a collection of over 500,000 accounts. We observe the difference among human, bot, and cyborg in terms of tweeting behavior, tweet content, and account properties. Based on the measurement results, we propose a classification system that includes the following four parts: 1) an entropy-based component, 2) a spam detection component, 3) an account properties component, and 4) a decision maker. It uses the combination of features extracted from an unknown user to determine the likelihood of being a human, bot, or cyborg. Our experimental evaluation demonstrates the efficacy of the proposed classification system. read more read less

Topics:

Microblogging (54%)54% related to the paper, Electronic mail (51%)51% related to the paper
View PDF
600 Citations
Journal Article DOI: 10.1109/TDSC.2009.4
A Large-Scale Study of Failures in High-Performance Computing Systems
Bianca Schroeder1, Garth A. Gibson2

Abstract:

Designing highly dependable systems requires a good understanding of failure characteristics. Unfortunately, little raw data on failures in large IT installations are publicly available. This paper analyzes failure data collected at two large high-performance computing sites. The first data set has been collected over the pas... Designing highly dependable systems requires a good understanding of failure characteristics. Unfortunately, little raw data on failures in large IT installations are publicly available. This paper analyzes failure data collected at two large high-performance computing sites. The first data set has been collected over the past nine years at Los Alamos National Laboratory (LANL) and has recently been made publicly available. It covers 23,000 failures recorded on more than 20 different systems at LANL, mostly large clusters of SMP and NUMA nodes. The second data set has been collected over the period of one year on one large supercomputing system comprising 20 nodes and more than 10,000 processors. We study the statistics of the data, including the root cause of failures, the mean time between failures, and the mean time to repair. We find, for example, that average failure rates differ wildly across systems, ranging from 20-1000 failures per year, and that time between failures is modeled well by a Weibull distribution with decreasing hazard rate. From one system to another, mean repair time varies from less than an hour to more than a day, and repair times are well modeled by a lognormal distribution. read more read less

Topics:

Mean time between failures (65%)65% related to the paper, Mean time to repair (57%)57% related to the paper
575 Citations
Author Pic

SciSpace is a very innovative solution to the formatting problem and existing providers, such as Mendeley or Word did not really evolve in recent years.

- Andreas Frutiger, Researcher, ETH Zurich, Institute for Biomedical Engineering

Get MS-Word and LaTeX output to any Journal within seconds
1
Choose a template
Select a template from a library of 40,000+ templates
2
Import a MS-Word file or start fresh
It takes only few seconds to import
3
View and edit your final output
SciSpace will automatically format your output to meet journal guidelines
4
Submit directly or Download
Submit to journal directly or Download in PDF, MS Word or LaTeX

(Before submission check for plagiarism via Turnitin)

clock Less than 3 minutes

What to expect from SciSpace?

Speed and accuracy over MS Word

''

With SciSpace, you do not need a word template for IEEE Transactions on Dependable and Secure Computing.

It automatically formats your research paper to IEEE formatting guidelines and citation style.

You can download a submission ready research paper in pdf, LaTeX and docx formats.

Time comparison

Time taken to format a paper and Compliance with guidelines

Plagiarism Reports via Turnitin

SciSpace has partnered with Turnitin, the leading provider of Plagiarism Check software.

Using this service, researchers can compare submissions against more than 170 million scholarly articles, a database of 70+ billion current and archived web pages. How Turnitin Integration works?

Turnitin Stats
Publisher Logos

Freedom from formatting guidelines

One editor, 100K journal formats – world's largest collection of journal templates

With such a huge verified library, what you need is already there.

publisher-logos

Easy support from all your favorite tools

IEEE Transactions on Dependable and Secure Computing format uses IEEEtran citation style.

Automatically format and order your citations and bibliography in a click.

SciSpace allows imports from all reference managers like Mendeley, Zotero, Endnote, Google Scholar etc.

Frequently asked questions

1. Can I write IEEE Transactions on Dependable and Secure Computing in LaTeX?

Absolutely not! Our tool has been designed to help you focus on writing. You can write your entire paper as per the IEEE Transactions on Dependable and Secure Computing guidelines and auto format it.

2. Do you follow the IEEE Transactions on Dependable and Secure Computing guidelines?

Yes, the template is compliant with the IEEE Transactions on Dependable and Secure Computing guidelines. Our experts at SciSpace ensure that. If there are any changes to the journal's guidelines, we'll change our algorithm accordingly.

3. Can I cite my article in multiple styles in IEEE Transactions on Dependable and Secure Computing?

Of course! We support all the top citation styles, such as APA style, MLA style, Vancouver style, Harvard style, and Chicago style. For example, when you write your paper and hit autoformat, our system will automatically update your article as per the IEEE Transactions on Dependable and Secure Computing citation style.

4. Can I use the IEEE Transactions on Dependable and Secure Computing templates for free?

Sign up for our free trial, and you'll be able to use all our features for seven days. You'll see how helpful they are and how inexpensive they are compared to other options, Especially for IEEE Transactions on Dependable and Secure Computing.

5. Can I use a manuscript in IEEE Transactions on Dependable and Secure Computing that I have written in MS Word?

Yes. You can choose the right template, copy-paste the contents from the word document, and click on auto-format. Once you're done, you'll have a publish-ready paper IEEE Transactions on Dependable and Secure Computing that you can download at the end.

6. How long does it usually take you to format my papers in IEEE Transactions on Dependable and Secure Computing?

It only takes a matter of seconds to edit your manuscript. Besides that, our intuitive editor saves you from writing and formatting it in IEEE Transactions on Dependable and Secure Computing.

7. Where can I find the template for the IEEE Transactions on Dependable and Secure Computing?

It is possible to find the Word template for any journal on Google. However, why use a template when you can write your entire manuscript on SciSpace , auto format it as per IEEE Transactions on Dependable and Secure Computing's guidelines and download the same in Word, PDF and LaTeX formats? Give us a try!.

8. Can I reformat my paper to fit the IEEE Transactions on Dependable and Secure Computing's guidelines?

Of course! You can do this using our intuitive editor. It's very easy. If you need help, our support team is always ready to assist you.

9. IEEE Transactions on Dependable and Secure Computing an online tool or is there a desktop version?

SciSpace's IEEE Transactions on Dependable and Secure Computing is currently available as an online tool. We're developing a desktop version, too. You can request (or upvote) any features that you think would be helpful for you and other researchers in the "feature request" section of your account once you've signed up with us.

10. I cannot find my template in your gallery. Can you create it for me like IEEE Transactions on Dependable and Secure Computing?

Sure. You can request any template and we'll have it setup within a few days. You can find the request box in Journal Gallery on the right side bar under the heading, "Couldn't find the format you were looking for like IEEE Transactions on Dependable and Secure Computing?”

11. What is the output that I would get after using IEEE Transactions on Dependable and Secure Computing?

After writing your paper autoformatting in IEEE Transactions on Dependable and Secure Computing, you can download it in multiple formats, viz., PDF, Docx, and LaTeX.

12. Is IEEE Transactions on Dependable and Secure Computing's impact factor high enough that I should try publishing my article there?

To be honest, the answer is no. The impact factor is one of the many elements that determine the quality of a journal. Few of these factors include review board, rejection rates, frequency of inclusion in indexes, and Eigenfactor. You need to assess all these factors before you make your final call.

13. What is Sherpa RoMEO Archiving Policy for IEEE Transactions on Dependable and Secure Computing?

SHERPA/RoMEO Database

We extracted this data from Sherpa Romeo to help researchers understand the access level of this journal in accordance with the Sherpa Romeo Archiving Policy for IEEE Transactions on Dependable and Secure Computing. The table below indicates the level of access a journal has as per Sherpa Romeo's archiving policy.

RoMEO Colour Archiving policy
Green Can archive pre-print and post-print or publisher's version/PDF
Blue Can archive post-print (ie final draft post-refereeing) or publisher's version/PDF
Yellow Can archive pre-print (ie pre-refereeing)
White Archiving not formally supported
FYI:
  1. Pre-prints as being the version of the paper before peer review and
  2. Post-prints as being the version of the paper after peer-review, with revisions having been made.

14. What are the most common citation types In IEEE Transactions on Dependable and Secure Computing?

The 5 most common citation types in order of usage for IEEE Transactions on Dependable and Secure Computing are:.

S. No. Citation Style Type
1. Author Year
2. Numbered
3. Numbered (Superscripted)
4. Author Year (Cited Pages)
5. Footnote

15. How do I submit my article to the IEEE Transactions on Dependable and Secure Computing?

It is possible to find the Word template for any journal on Google. However, why use a template when you can write your entire manuscript on SciSpace , auto format it as per IEEE Transactions on Dependable and Secure Computing's guidelines and download the same in Word, PDF and LaTeX formats? Give us a try!.

16. Can I download IEEE Transactions on Dependable and Secure Computing in Endnote format?

Yes, SciSpace provides this functionality. After signing up, you would need to import your existing references from Word or Bib file to SciSpace. Then SciSpace would allow you to download your references in IEEE Transactions on Dependable and Secure Computing Endnote style according to Elsevier guidelines.

Fast and reliable,
built for complaince.

Instant formatting to 100% publisher guidelines on - SciSpace.

Available only on desktops 🖥

No word template required

Typset automatically formats your research paper to IEEE Transactions on Dependable and Secure Computing formatting guidelines and citation style.

Verifed journal formats

One editor, 100K journal formats.
With the largest collection of verified journal formats, what you need is already there.

Trusted by academicians

I spent hours with MS word for reformatting. It was frustrating - plain and simple. With SciSpace, I can draft my manuscripts and once it is finished I can just submit. In case, I have to submit to another journal it is really just a button click instead of an afternoon of reformatting.

Andreas Frutiger
Researcher & Ex MS Word user
Use this template