|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 28 occurrences of 28 keywords
|
|
|
Results
Found 40 publication records. Showing 40 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
27 | Lang Lin, Wayne P. Burleson |
Analysis and mitigation of process variation impacts on Power-Attack Tolerance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 46th Design Automation Conference, DAC 2009, San Francisco, CA, USA, July 26-31, 2009, pp. 238-243, 2009, ACM, 978-1-60558-497-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
process variation, differential power analysis, Monte Carlo simulation, transistor sizing |
24 | Mariana Segovia-Ferreira |
Cyber-resilience and attack tolerance for cyber-physical systems. (Cyber-résilience et tolérance aux attaques des systèmes cyber-physiques). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2021 |
RDF |
|
24 | Georges Ouffoué |
Attack tolerance for services-based applications in the Cloud. (Tolérance aux attaques pour les applications orientées services Web dans le cloud). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2018 |
RDF |
|
23 | Yasuhiro Sato, Shingo Ata, Ikuo Oka |
A strategic approach for re-organization of internet topology for improving both efficiency and attack tolerance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil, pp. 331-338, 2008, IEEE, 978-1-4244-2066-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Xinli Huang, Yin Li, Ruijun Yang, Fanyuan Ma |
Enhancing Attack Survivability of Gnutella-like P2P Networks by Targeted Immunization Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2005), 5-8 December 2005, Dalian, China, pp. 503-506, 2005, IEEE Computer Society, 0-7695-2405-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Adam J. O'Donnell, Harish Sethu |
On achieving software diversity for improved network security using distributed coloring algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 121-131, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
software monoculture, viruses and worms, network security, graph coloring, survivability, software diversity |
16 | Alexander W. Min, Kang G. Shin, Xin Hu 0001 |
Secure Cooperative Sensing in IEEE 802.22 WRANs Using Shadow Fading Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 10(10), pp. 1434-1447, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
shadowing correlation, attack tolerance, IEEE 802.22, sensing scheduling, Cognitive radio, cooperative sensing |
16 | Taejoon Park, Kang G. Shin |
Secure routing based on distributed key sharing in large-scale sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 7(2), pp. 20:1-20:28, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Distributed key sharing and servers, attack tolerance, large-scale sensor networks, secure geographic forwarding, key establishment |
16 | Taejoon Park, Kang G. Shin |
Attack-tolerant localization via iterative verification of locations in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 8(1), pp. 2:1-2:24, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
attack-tolerance, sensor networks, localization, Anomaly detection, recursive least squares |
16 | Jie Xu 0007, Erica Y. Yang, Keith H. Bennett |
A Practical Approach to Secure Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISORC ![In: Ninth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2006), 24-26 April 2006, Gyeongju, Korea, pp. 512-519, 2006, IEEE Computer Society, 0-7695-2561-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Attack tolerance, malicious attacks, Web services, privacy protection, distributed information retrieval |
16 | Yi Yuan, Hoong Kee Ng |
DATCONS: Protecting Web-Based QoS from DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: Management of Integrated End-to-End Communications and Services, 10th IEEE/IFIP Network Operations and Management Symposium, NOMS 2006, Vancouver, Canada, April 3-7, 2006. Proceedings, 2006, IEEE, 1-4244-0143-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Chenrui Zhang, Yiming Jiang 0014, Shuang Shen, Rediet Tesfaye Zeru, Yuanqing Xia, Senchun Chai |
Inherent attack tolerance properties of model predictive control under DoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Frankl. Inst. ![In: J. Frankl. Inst. 361(3), pp. 1371-1385, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Yang Xia, Yan Xu 0005, Suman Mondal, Amit Kumar Gupta |
A Transfer Learning-Based Method for Cyber-Attack Tolerance in Distributed Control of Microgrids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Smart Grid ![In: IEEE Trans. Smart Grid 15(2), pp. 1258-1270, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Mohammad Taherifard, Mahdi Fazeli, Ahmad Patooghy |
Scan-based attack tolerance with minimum testability loss: a gate-level approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 14(4), pp. 459-469, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Wenbo Zhou, Philippe Dague, Lei Liu, Lina Ye, Fatiha Zaïdi |
A Coloured Petri Nets Based Attack Tolerance Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSEC ![In: 27th Asia-Pacific Software Engineering Conference, APSEC 2020, Singapore, December 1-4, 2020, pp. 159-168, 2020, IEEE, 978-1-7281-9553-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Michihiro Shintani, Tomoki Mino, Michiko Inoue |
LBIST-PUF: An LBIST Scheme Towards Efficient Challenge-Response Pairs Collection and Machine-Learning Attack Tolerance Improvement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATS ![In: 29th IEEE Asian Test Symposium, ATS 2020, Penang, Malaysia, November 23-26, 2020, pp. 1-6, 2020, IEEE, 978-1-7281-7467-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Georges Ouffoué, Fatiha Zaïdi, Ana R. Cavalli |
Attack Tolerance for Services-Based Applications in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTSS ![In: Testing Software and Systems - 31st IFIP WG 6.1 International Conference, ICTSS 2019, Paris, France, October 15-17, 2019, Proceedings, pp. 242-258, 2019, Springer, 978-3-030-31279-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Marcin Waniek, Kai Zhou 0001, Yevgeniy Vorobeychik, Esteban Moro, Tomasz P. Michalak, Talal Rahwan |
Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1809.00152, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
15 | Philipp Richter, Mikko Valkama, Elena Simona Lohan |
Attack tolerance of RSS-based fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: 2018 IEEE Wireless Communications and Networking Conference, WCNC 2018, Barcelona, Spain, April 15-18, 2018, pp. 1-6, 2018, IEEE, 978-1-5386-1734-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Xiangwen Liu, Liangmin Wang 0001, Yuquan Zhu |
SLAT: Sub-Trajectory Linkage Attack Tolerance Framework for Privacy-Preserving Trajectory Publishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NaNA ![In: International Conference on Networking and Network Applications, NaNA 2018, Xi'an, China, October 12-15, 2018, pp. 298-303, 2018, IEEE, 978-1-5386-8303-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | John Matta, Gunes Ercal, Jeffrey Borwey |
The vertex attack tolerance of complex networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAIRO Oper. Res. ![In: RAIRO Oper. Res. 51(4), pp. 1055-1076, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Vecdi Aytaç, Tufan Turaci |
Relationships between vertex attack tolerance and other vulnerability parameters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAIRO Theor. Informatics Appl. ![In: RAIRO Theor. Informatics Appl. 51(1), pp. 17-27, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Georges Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir Lallali |
Model-Based Attack Tolerance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 31st International Conference on Advanced Information Networking and Applications Workshops, AINA 2017 Workshops, Taipei, Taiwan, March 27-29, 2017, pp. 68-73, 2017, IEEE Computer Society, 978-1-5090-6231-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Gunes Ercal |
A Note on the Computational Complexity of Unsmoothened Vertex Attack Tolerance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1603.08430, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Georges Ouffoue, Antonio M. Ortiz, Ana R. Cavalli, Wissam Mallouli, Josep Domingo-Ferrer, David Sánchez 0001, Fatiha Zaïdi |
Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 36th IEEE International Conference on Distributed Computing Systems Workshops, ICDCS Workshops, Nara, Japan, June 27-30, 2016, pp. 61-66, 2016, IEEE Computer Society, 978-1-5090-3686-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Jeffrey Borwey, Darla Ahlert, Tayo Obafemi-Ajayi, Gunes Ercal |
A Graph-Theoretic Clustering Methodology Based on Vertex-Attack Tolerance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FLAIRS ![In: Proceedings of the Twenty-Eighth International Florida Artificial Intelligence Research Society Conference, FLAIRS 2015, Hollywood, Florida, USA, May 18-20, 2015., pp. 404-409, 2015, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
15 | John Matta, Jeffrey Borwey, Gunes Ercal |
Comparative Resilience Notions and Vertex Attack Tolerance of Scale-Free Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1404.0103, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
15 | Gunes Ercal |
On Vertex Attack Tolerance in Regular Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1409.2172, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
15 | Nicolas Stefanovitch, Aamena Alshamsi, Manuel Cebrián, Iyad Rahwan |
Error and attack tolerance of collective problem solving: The DARPA Shredder Challenge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EPJ Data Sci. ![In: EPJ Data Sci. 3(1), pp. 13, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Fengyun Li, Huan Zhang, Fuxiang Gao, Peng Li |
Location estimation for wireless sensor networks with attack tolerance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Wirel. Mob. Comput. ![In: Int. J. Wirel. Mob. Comput. 6(2), pp. 175-181, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Mahdi Jalili |
Error and attack tolerance of small-worldness in complex networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Informetrics ![In: J. Informetrics 5(3), pp. 422-430, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Zehui Qu, Pu Wang, Zhiguang Qin |
Enhancing the Scale-Free Network's Attack Tolerance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex (2) ![In: Complex Sciences, First International Conference, Complex 2009, Shanghai, China, February 23-25, 2009. Revised Papers, Part 2, pp. 1823-1826, 2009, Springer, 978-3-642-02468-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
intentional attack, network, robustness, Complex network, scale-free network |
15 | Shangping Ren, Yue Yu 0002, Kevin A. Kwiat, Jeffrey J. P. Tsai |
A Coordination Model for Improving Software System Attack-Tolerance and Survivability in Open Hostile Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Distributed Sens. Networks ![In: Int. J. Distributed Sens. Networks 3(2), pp. 175-199, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Kevin A. Kwiat, Shangping Ren |
A Coordination Model for Improving Software System Attack-tolerance and Survivability in Open Hostile Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SUTC (1) ![In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), 5-7 June 2006, Taichung, Taiwan, pp. 394-402, 2006, IEEE Computer Society, 0-7695-2553-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Yunwen Yang |
Software-implemented attack tolerance for critical information retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2004 |
RDF |
|
12 | Yanxiang He, Qiang Cao, Yi Han, Libing Wu, Tao Liu |
Reduction of Quality (RoQ) attacks on structured peer-to-peer networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23-29, 2009, pp. 1-9, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Jin Han, Debin Gao, Robert H. Deng |
On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings, pp. 127-146, 2009, Springer, 978-3-642-02917-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Xinli Huang, Futai Zou, Fan-Yuan Ma |
Targeted Local Immunization in Scale-Free Peer-to-Peer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 22(3), pp. 457-468, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
targeted local immunization, efficiency, peer-to-peer networks, cost, rate control, scale-free, overlay topology |
8 | Balachander Krishnamurthy, Walter Willinger |
What are our standards for validation of measurement-based networking research? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS Perform. Evaluation Rev. ![In: SIGMETRICS Perform. Evaluation Rev. 36(2), pp. 64-69, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
8 | Yi Xin Su, Jimson Mathew, Jawar Singh, Dhiraj K. Pradhan |
Pseudo parallel architecture for AES with error correction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoCC ![In: 21st Annual IEEE International SoC Conference, SoCC 2008, September 17-20, 2008, Radisson Hotel, Newport Beach, CA, USA, Proceedings, pp. 187-190, 2008, IEEE, 978-1-4244-2596-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #40 of 40 (100 per page; Change: )
|
|