|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 149 occurrences of 81 keywords
|
|
|
Results
Found 169 publication records. Showing 169 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
93 | Liangmin Wang 0001, Jianfeng Ma 0001, Chao Wang 0085, A. C. Kot |
Fault and intrusion tolerance of wireless sensor networks. |
IPDPS |
2006 |
DBLP DOI BibTeX RDF |
|
82 | Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough |
DSO: Dependable Signing Overlay. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
P2P overlay, digital signing service, fault-tolerance, dependable, intrusion-tolerance |
68 | GangShin Lee, Chaetae Im, TaeJin Lee 0002, HyungJong Kim 0002, Dong Hoon Lee 0001 |
SITIS: Scalable Intrusion Tolerance Middleware for Internet Service Survivability. |
PCM (1) |
2004 |
DBLP DOI BibTeX RDF |
SITIS, Middle-ware, Voting, Intrusion Tolerance, Group Management |
64 | Hyung-Jong Kim 0002 |
Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction. |
AIS |
2004 |
DBLP DOI BibTeX RDF |
Atomic Vulnerability, DNS, Intrusion Tolerance, Vulnerability Analysis, DEVS formalism |
61 | Robert J. Stroud, Ian S. Welch, John P. Warne, Peter Y. A. Ryan |
A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture. |
DSN |
2004 |
DBLP DOI BibTeX RDF |
|
60 | Kim Potter Kihlstrom, Priya Narasimhan |
The Starfish System: Providing Intrusion Detection and Intrusion Tolerance for Middleware Systems. |
WORDS |
2003 |
DBLP DOI BibTeX RDF |
|
58 | Rabih Zbib, Farooq Anjum, Abhrajit Ghosh, Amjad Umar |
Intrusion Tolerance in Distributed Middleware. |
Inf. Syst. Frontiers |
2004 |
DBLP DOI BibTeX RDF |
secure middleware, middleware, intrusion tolerance |
55 | Young-Soo Kim, Kab-Seung Kou, Gang-Soo Lee |
Intrusion Tolerance Model for Electronic Commerce System. |
FGCN (1) |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Matthew Smith 0001, Christian Schridde, Bernd Freisleben |
Securing stateful grid servers through virtual server rotation. |
HPDC |
2008 |
DBLP DOI BibTeX RDF |
self-cleansing servers, security, grid computing, virtualization, intrusion tolerance |
51 | Miguel Correia 0001, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo |
Low complexity Byzantine-resilient consensus. |
Distributed Comput. |
2005 |
DBLP DOI BibTeX RDF |
distributed systems models, distributed algorithms, consensus, intrusion tolerance, Byzantine fault tolerance |
50 | Sankalp Singh, Michel Cukier, William H. Sanders |
Probabilistic Validation of an Intrusion-Tolerant Replication System. |
DSN |
2003 |
DBLP DOI BibTeX RDF |
|
47 | Yih Huang, David Arsenault, Arun Sood |
Incorruptible system self-cleansing for intrusion tolerance. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Bruno Dutertre, Valentin Crettaz, Victoria Stavridou |
Intrusion-Tolerant Enclaves. |
S&P |
2002 |
DBLP DOI BibTeX RDF |
Groupware, Secret sharing, Intrusion tolerance |
43 | Michael E. Locasto, Ke Wang 0009, Angelos D. Keromytis, Salvatore J. Stolfo |
FLIPS: Hybrid Adaptive Intrusion Prevention. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
Adaptive Response, Intrusion Tolerance, Intrusion Prevention |
42 | Amel Meddeb, Yacine Djemaiel, Noureddine Boudriga |
Global intrusion detection and tolerance in networked systems. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
disk-based intrusion detection, global detection, local detection, tolerance, distributed attacks |
41 | Alex Hai Wang, Peng Liu 0005 |
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Salvatore D'Antonio, Simon Pietro Romano, Steven Simpson, Paul Smith 0001, David Hutchison 0001 |
A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks. |
IWSOS |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Paulo Veríssimo |
Thou Shalt Not Trust non-Trustworthy Systems. |
ICDCS Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia 0001 |
Intrusion-Tolerant Architectures: Concepts and Design. |
WADS |
2002 |
DBLP DOI BibTeX RDF |
|
38 | Eung Ki Park, Dae-Sik Choi, Eul-Gyu Im, Jung-Taek Seo, Dongkyu Kim |
Adaptive Architecture for Web Server Survivability. |
ADVIS |
2004 |
DBLP DOI BibTeX RDF |
web services, survivability, intrusion tolerance |
38 | Eung Ki Park, Dae-Sik Choi, Jung-Taek Seo, Choonsik Park, Dongkyu Kim |
Adaptation Enhanced Mechanism for Web Survivability. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
web services, survivability, intrusion tolerance |
37 | Dengguo Feng, Ji Xiang |
Experiences on Intrusion Tolerance Distributed Systems. |
COMPSAC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Guofei Gu, Bin B. Zhu, Shipeng Li 0001, Shiyong Zhang |
PLI: A New Framework to Protect Digital Content for P2P Networks. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
digital content protection, Public License Infrastructure (PLI), License Authority (LA), proactive shares update, distributed trust model, secret sharing, intrusion tolerance, Peer-to-Peer (P2P), Digital Rights Management (DRM) |
33 | Ruiping Ma, Liudong Xing, Howard E. Michel |
Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks. |
DASC |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Lin Chen, Zhitang Li, Cuixia Gao, Lan Liu 0003 |
Dynamic Forensics Based on Intrusion Tolerance. |
ISPA |
2009 |
DBLP DOI BibTeX RDF |
dynamic forensics, finite state machine, intrusion tolerance |
33 | Peng Liu 0005, Sushil Jajodia |
Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance. |
CSFW |
2001 |
DBLP DOI BibTeX RDF |
Damage Confinement, Database Security, Intrusion Tolerance |
32 | Liwu Zhang, Dengguo Feng |
Intrusion Tolerant CA Scheme with Cheaters Detection Ability. |
ISPA Workshops |
2005 |
DBLP DOI BibTeX RDF |
Intrusion Tolerance, Proactive, Threshold Signature, CA |
32 | Dae-Sik Choi, Eul-Gyu Im, Cheol Won Lee |
Intrusion-Tolerant System Design for Web Server Survivability. |
WISA |
2003 |
DBLP DOI BibTeX RDF |
web services, survivability, intrusion tolerance |
32 | David Sames, Brian Matt, Brian Niebuhr, Gregg Tally, Brent Whitmore, David E. Bakken |
Developing a Heterogeneous Intrusion Tolerant CORBA System. |
DSN |
2002 |
DBLP DOI BibTeX RDF |
|
32 | Xianfeng Zhang, Feng Zhang, Zhiguang Qin, Jinde Liu |
ECC Based Intrusion Tolerance for Web Security. |
GCC (1) |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe |
Dependable Intrusion Tolerance: Technology Demo. |
DISCEX (2) |
2003 |
DBLP DOI BibTeX RDF |
|
32 | HariGovind V. Ramasamy, Prashant Pandey 0005, James Lyons, Michel Cukier, William H. Sanders |
Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems. |
DSN |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Mohamed Layouni, Jozef Hooman, Sofiène Tahar |
On the Correctness of an Intrusion-Tolerant Group Communication Protocol. |
CHARME |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Miguel Correia 0001, Nuno Ferreira Neves, Paulo Veríssimo |
How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems. |
SRDS |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe |
An Architecture for an Adaptive Intrusion-Tolerant Server. |
Security Protocols Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
26 | David Arsenault, Arun Sood, Yih Huang |
Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES). |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Bumjoo Park, Kiejin Park, Sungsoo Kim |
A Self-healing Mechanism for an Intrusion Tolerance System. |
TrustBus |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Michael Atighetchi, Partha P. Pal, Franklin Webber, Richard E. Schantz, Christopher C. Jones, Joseph P. Loyall |
Adaptive Cyberdefense for Survival and Intrusion Tolerance. |
IEEE Internet Comput. |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Jing Deng 0002, Richard Han 0001, Shivakant Mishra |
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks. |
DSN |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Haoran Liu, Rongrong Yin, Bin Liu 0044, Yaqian Li |
A scale-free topology model with fault-tolerance and intrusion-tolerance in wireless sensor networks. |
Comput. Electr. Eng. |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Alysson Neves Bessani |
From Byzantine fault tolerance to intrusion tolerance (a position paper). |
DSN Workshops |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Paulo Veríssimo, Nuno Ferreira Neves, Christian Cachin, Jonathan A. Poritz, David Powell, Yves Deswarte, Robert J. Stroud, Ian Welch |
Intrusion-tolerant middleware: the road to automatic security. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Anatoliy Gorbenko, Vyacheslav S. Kharchenko, Olga Tarasyuk, Alexey Furmanov |
F(I)MEA-Technique of Web Services Analysis and Dependability Ensuring. |
RODIN Book |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Liang-Min Wang, Jian-Feng Ma 0001, Yong-Zhao Zhan |
Modelling intrusion for intrusion tolerance system by correlating alerts from IDS sensor. |
Int. J. Autom. Control. |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Yih Huang, David Arsenault, Arun Sood |
Closing Cluster Attack Windows Through Server Redundancy and Rotations. |
CCGRID |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Kaile Su, Congxin Zhao, Guanfeng Lv, Han Lin, Qingliang Chen |
Formal Analysis and Improvement of the State Transition Model for Intrusion Tolerant System. |
WINE |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Peng Liu 0005 |
Architectures for Intrusion Tolerant Database Systems. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Tao Zhang 0037, Xiaotong Zhuang, Santosh Pande |
Building Intrusion-Tolerant Secure Software. |
CGO |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum |
Support for multi-level security policies in DRM architectures. |
NSPW |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Hassen Saïdi, Victoria Stavridou, Bruno Dutertre |
Protocol Codesign. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
18 | John P. McDermott, Anya Kim, Judith N. Froscher |
Merging paradigms of survivability and security: stochastic faults and designed faults. |
NSPW |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Quyen L. Nguyen, Arun Sood |
A Comparison of Intrusion-Tolerant System Architectures. |
IEEE Secur. Priv. |
2011 |
DBLP DOI BibTeX RDF |
D.0 General, D.2.4.d Formal methods, D.4.6.a Access controls, D.4.6.b Authentication, K.4.4.f Security, K.4.4.g Internet security policies, K.6.5.a Authentication, K.6.5.c Invasive software (viruses, worms, Trojan horses), K.6.5.e Unauthorized access (hacking, phreaking), K.6.m.b Security, C.4.f Reliability, D.2.9.m Risk management, D.4.5.e High availability, D.4.6.d Information flow controls, Data exfiltration, Intrusion Tolerance, availability and serviceability |
17 | Paulo Sousa 0001, Alysson Neves Bessani, Miguel Correia 0001, Nuno Ferreira Neves, Paulo Veríssimo |
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery. |
IEEE Trans. Parallel Distributed Syst. |
2010 |
DBLP DOI BibTeX RDF |
reactive recovery, firewall, Intrusion tolerance, proactive recovery |
17 | Alex Hai Wang, Su Yan 0001, Peng Liu 0005 |
A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
Survivability, Database Security, Intrusion Tolerance, Semi-Markov Process, Modeling and Evaluation |
17 | Valdir Stumm Jr., Lau Cheuk Lung, Miguel Correia 0001, Joni da Silva Fraga, Jim Lau |
Intrusion Tolerant Services Through Virtualization: A Shared Memory Approach. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
Virtualization, Shared Memory, Intrusion Tolerance |
17 | Raul Barbosa |
Monitoring Local Progress with Watchdog Timers Deduced from Global Properties. |
SRDS |
2010 |
DBLP DOI BibTeX RDF |
watchdogs, fault tolerance, distributed systems, model checking, intrusion tolerance, online monitoring |
17 | Yih Huang, Anup K. Ghosh |
Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services. |
NCA |
2009 |
DBLP DOI BibTeX RDF |
trustworhy computing, web server security, intrusion tolerance, service availability, automatic recovery |
17 | Soontaree Tanaraksiritavorn, Shivakant Mishra |
A Privacy Preserving Intrusion Tolerant Voting Architecture. |
NCA |
2009 |
DBLP DOI BibTeX RDF |
inexact voting, security, intrusion tolerance |
17 | Michael Atighetchi, Partha P. Pal |
From Auto-adaptive to Survivable and Self-Regenerative Systems. |
NCA |
2009 |
DBLP DOI BibTeX RDF |
Cognitive Algorithms, Autonomous Computing, Survivability, Information Assurance, Intrusion Tolerance |
17 | Toshikazu Uemura, Tadashi Dohi, Naoto Kaio |
Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes. |
CloudCom |
2009 |
DBLP DOI BibTeX RDF |
SITAR, detection mode, EMC approach, cloud computing circumstance, availability, intrusion tolerance, discrete-time modeling |
17 | Paul D. Ezhilchelvan, Dylan Clarke, Isi Mitrani, Santosh K. Shrivastava |
Proactive Fortification of Fault-Tolerant Services. |
OPODIS |
2009 |
DBLP DOI BibTeX RDF |
Primary-Backup, Code randomization, Replication, State machines, Intrusion tolerance, Agreement, Analytical evaluations |
17 | Giuliana Santos Veronese, Miguel Correia 0001, Lau Cheuk Lung, Paulo Veríssimo |
Finite Memory: A Vulnerability of Intrusion-Tolerant Systems. |
NCA |
2008 |
DBLP DOI BibTeX RDF |
Garbage Collection, Buffer Management, Intrusion Tolerance, Byzantine Fault Tolerance |
17 | Liwei Kuang, Mohammad Zulkernine |
An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Intrusion detection systems, Intrusion-tolerance |
17 | Abdelraouf Ouadjaout, Yacine Challal, Noureddine Lasla, Miloud Bagaa |
SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Security, Wireless sensor networks, Fault tolerance, Intrusion tolerance, Secure routing |
17 | Håvard D. Johansen, Dag Johansen |
Resilient Software Mirroring With Untrusted Third Parties. |
HotSWUp |
2008 |
DBLP DOI BibTeX RDF |
overlay network, intrusion-tolerance, software distribution, denial-of-service attack |
17 | Alysson Neves Bessani, Hans P. Reiser, Paulo Sousa 0001, Ilir Gashi, Vladimir Stankovic 0002, Tobias Distler, Rüdiger Kapitza, Alessandro Daidone, Rafael R. Obelheiro |
FOREVER: Fault/intrusiOn REmoVal through Evolution & Recovery. |
Middleware (Companion) |
2008 |
DBLP DOI BibTeX RDF |
replication, intrusion tolerance, proactive recovery |
17 | Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K. Iyer |
Inner-Circle Consistency for Wireless Ad Hoc Networks. |
IEEE Trans. Mob. Comput. |
2007 |
DBLP DOI BibTeX RDF |
security, sensor networks, ad hoc networks, reliability, Intrusion tolerance |
17 | HariGovind V. Ramasamy, Mouna Seri, William H. Sanders |
The coBFIT toolkit. |
PODC |
2007 |
DBLP DOI BibTeX RDF |
replication, intrusion tolerance, byzantine faults, software toolkit |
17 | Toshikazu Uemura, Tadashi Dohi |
Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks Via Semi-Markov Cost Models. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
long-run average cost, information security, intrusion tolerance, preventive maintenance, semi-Markov models, DoS attack |
17 | Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting |
System Call Monitoring Using Authenticated System Calls. |
IEEE Trans. Dependable Secur. Comput. |
2006 |
DBLP DOI BibTeX RDF |
operating systems, security policy, Intrusion tolerance, compiler techniques, sandboxing |
17 | Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong |
Resource allocation for restoration of compromised systems. |
J. Comb. Optim. |
2006 |
DBLP DOI BibTeX RDF |
System restoration, Resource allocation, Intrusion tolerance, Internet worm, Cost analysis |
17 | Paulo Sousa 0001, Nuno Ferreira Neves, Paulo Veríssimo |
Proactive resilience through architectural hybridization. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
secret sharing, intrusion tolerance, proactive recovery |
17 | Byoung Min Joon |
Intrusion-Tolerant Server Architecture for Survivable Services. |
J. Supercomput. |
2005 |
DBLP DOI BibTeX RDF |
replicated server architecture, survivability, voting, intrusion-tolerance |
17 | Yong-Joon Park, Gyungho Lee |
Repairing return address stack for buffer overflow protection. |
Conf. Computing Frontiers |
2004 |
DBLP DOI BibTeX RDF |
computer architecture, computer security, buffer overflow, intrusion tolerance |
17 | Matti A. Hiltunen, Richard D. Schlichting, Carlos A. Ugarte |
Building Survivable Services Using Redundancy and Adaptation. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
distributed systems, adaptation, dependability, redundancy, Survivability, trustworthiness, intrusion tolerance |
17 | Xunhua Wang, Mohammad Hossain Heydari, Hua Lin |
An Intrusion-Tolerant Password Authentication System. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
off-line dictionary attack, password-authenticated key exchange (PAKE), Intrusion tolerance |
17 | Peng Liu 0005 |
DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
Database Security, Intrusion Tolerance, Isolation |
17 | Kim Hammar, Rolf Stadler |
Intrusion Tolerance for Networked Systems through Two-Level Feedback Control. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Zhanwang Zhu, Yiming Yuan, Song Deng |
Data Intrusion Tolerance Model based on Game Theory for Energy Internet. |
ICDM (Workshops) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Maher Khan, Amy Babay |
Making Intrusion Tolerance Accessible: A Cloud-Based Hybrid Management Approach to Deploying Resilient Systems. |
SRDS |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Maher Khan, Amy Babay |
Toward Intrusion Tolerance as a Service: Confidentiality in Partially Cloud-Based BFT Systems. |
DSN |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Felicita Di Giandomenico, Giulio Masetti |
Basic Aspects in Redundancy-Based Intrusion Tolerance. |
CISIS-ICEUTE |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Fengquan Li |
A Markov-Based Intrusion Tolerance Finite Automaton. |
J. Comput. Inf. Technol. |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Jian-Hua Huang, Liang-Jie Chen, Fan-Chao Li, Ze Fang |
Security Quantification Method for Intrusion Tolerance Systems Based on Multi-recovery. |
Int. J. Netw. Secur. |
2018 |
DBLP BibTeX RDF |
|
17 | Jinhui Lei, Xiyan Tian, Zhixia Zhang |
Life Cycle and Intrusion Tolerance Optimization Topology Models for Wireless Sensor Networks. |
Int. J. Online Eng. |
2018 |
DBLP BibTeX RDF |
|
17 | Christoph Lambert, Marcus Völp, Jeremie Decouchant, Paulo Jorge Esteves Veríssimo |
Towards Real-Time-Aware Intrusion Tolerance. |
SRDS |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Ajay Nagarajan |
Realizing Cyber Resilience with Hybrid Intrusion Tolerance Architectures. |
|
2018 |
RDF |
|
17 | Zhi-yong Luo, Bo You, Peng Wang, Jie Su, Yi Liang |
Analysis and Optimization of System Intrusion Tolerance Capacity Based on Markov. |
Int. J. Netw. Secur. |
2017 |
DBLP BibTeX RDF |
|
17 | Yichi Zhang, Lingfeng Wang 0001, Yingmeng Xiang |
Power System Reliability Analysis With Intrusion Tolerance in SCADA Systems. |
IEEE Trans. Smart Grid |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Syrine Chatti, Habib Ounelli |
An Intrusion Tolerance Scheme for a Cloud of Databases Environment. |
NBiS |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Maryam Tanha, Fazirulhisyam Hashim, Shamala Subramaniam |
Secure and Self-healing Control Centers of Critical Infrastructures using Intrusion Tolerance. |
Int. J. Netw. Secur. |
2015 |
DBLP BibTeX RDF |
|
17 | Zuo Chen, Xue Li 0004, Bing Yang, Qian Zhang 0001 |
A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value. |
J. Sensors |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Houbao Xu |
Availability analysis for software system with intrusion tolerance. |
Appl. Math. Comput. |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Yu Jiang, Jie Huang 0016 |
An Intrusion Tolerance Method Based on Energy Attack for Wireless Sensor Network. |
Int. J. Distributed Sens. Networks |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Cong Wang, Fengli Zhang |
A vote-based intrusion-tolerance algorithm for network latency estimation. |
Int. J. Comput. Appl. Technol. |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Iman El Mir, Dong Seong Kim 0001, Abdelkrim Haqiq |
Security modeling and analysis of a self-cleansing intrusion tolerance technique. |
IAS |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Zuo Chen, Xue Li 0004, Bin Lv, Mengyuan Jia |
A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Particle Swarm Optimization and Cuckoo Search. |
TrustCom/BigDataSE/ISPA (1) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Shamina Hossain, Sriharsha Etigowni, Kate Davis 0001, Saman A. Zonouz |
Towards cyber-physical intrusion tolerance. |
SmartGridComm |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Miguel Garcia, Alysson Neves Bessani, Ilir Gashi, Nuno Ferreira Neves, Rafael R. Obelheiro |
Analysis of operating system diversity for intrusion tolerance. |
Softw. Pract. Exp. |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Tobias Distler |
Resource-efficient fault and intrusion tolerance. |
|
2014 |
RDF |
|
Displaying result #1 - #100 of 169 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|