The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase attack-tolerance (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2004-2009 (17) 2011-2018 (16) 2019-2024 (7)
Publication types (Num. hits)
article(18) inproceedings(19) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 28 occurrences of 28 keywords

Results
Found 40 publication records. Showing 40 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
27Lang Lin, Wayne P. Burleson Analysis and mitigation of process variation impacts on Power-Attack Tolerance. Search on Bibsonomy DAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF process variation, differential power analysis, Monte Carlo simulation, transistor sizing
24Mariana Segovia-Ferreira Cyber-resilience and attack tolerance for cyber-physical systems. (Cyber-résilience et tolérance aux attaques des systèmes cyber-physiques). Search on Bibsonomy 2021   RDF
24Georges Ouffoué Attack tolerance for services-based applications in the Cloud. (Tolérance aux attaques pour les applications orientées services Web dans le cloud). Search on Bibsonomy 2018   RDF
23Yasuhiro Sato, Shingo Ata, Ikuo Oka A strategic approach for re-organization of internet topology for improving both efficiency and attack tolerance. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Xinli Huang, Yin Li, Ruijun Yang, Fanyuan Ma Enhancing Attack Survivability of Gnutella-like P2P Networks by Targeted Immunization Scheme. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Adam J. O'Donnell, Harish Sethu On achieving software diversity for improved network security using distributed coloring algorithms. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF software monoculture, viruses and worms, network security, graph coloring, survivability, software diversity
16Alexander W. Min, Kang G. Shin, Xin Hu 0001 Secure Cooperative Sensing in IEEE 802.22 WRANs Using Shadow Fading Correlation. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF shadowing correlation, attack tolerance, IEEE 802.22, sensing scheduling, Cognitive radio, cooperative sensing
16Taejoon Park, Kang G. Shin Secure routing based on distributed key sharing in large-scale sensor networks. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Distributed key sharing and servers, attack tolerance, large-scale sensor networks, secure geographic forwarding, key establishment
16Taejoon Park, Kang G. Shin Attack-tolerant localization via iterative verification of locations in sensor networks. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attack-tolerance, sensor networks, localization, Anomaly detection, recursive least squares
16Jie Xu 0007, Erica Y. Yang, Keith H. Bennett A Practical Approach to Secure Web Services. Search on Bibsonomy ISORC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attack tolerance, malicious attacks, Web services, privacy protection, distributed information retrieval
16Yi Yuan, Hoong Kee Ng DATCONS: Protecting Web-Based QoS from DDoS Attacks. Search on Bibsonomy NOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Chenrui Zhang, Yiming Jiang 0014, Shuang Shen, Rediet Tesfaye Zeru, Yuanqing Xia, Senchun Chai Inherent attack tolerance properties of model predictive control under DoS attacks. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Yang Xia, Yan Xu 0005, Suman Mondal, Amit Kumar Gupta A Transfer Learning-Based Method for Cyber-Attack Tolerance in Distributed Control of Microgrids. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Mohammad Taherifard, Mahdi Fazeli, Ahmad Patooghy Scan-based attack tolerance with minimum testability loss: a gate-level approach. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Wenbo Zhou, Philippe Dague, Lei Liu, Lina Ye, Fatiha Zaïdi A Coloured Petri Nets Based Attack Tolerance Framework. Search on Bibsonomy APSEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Michihiro Shintani, Tomoki Mino, Michiko Inoue LBIST-PUF: An LBIST Scheme Towards Efficient Challenge-Response Pairs Collection and Machine-Learning Attack Tolerance Improvement. Search on Bibsonomy ATS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Georges Ouffoué, Fatiha Zaïdi, Ana R. Cavalli Attack Tolerance for Services-Based Applications in the Cloud. Search on Bibsonomy ICTSS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Marcin Waniek, Kai Zhou 0001, Yevgeniy Vorobeychik, Esteban Moro, Tomasz P. Michalak, Talal Rahwan Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
15Philipp Richter, Mikko Valkama, Elena Simona Lohan Attack tolerance of RSS-based fingerprinting. Search on Bibsonomy WCNC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Xiangwen Liu, Liangmin Wang 0001, Yuquan Zhu SLAT: Sub-Trajectory Linkage Attack Tolerance Framework for Privacy-Preserving Trajectory Publishing. Search on Bibsonomy NaNA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15John Matta, Gunes Ercal, Jeffrey Borwey The vertex attack tolerance of complex networks. Search on Bibsonomy RAIRO Oper. Res. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Vecdi Aytaç, Tufan Turaci Relationships between vertex attack tolerance and other vulnerability parameters. Search on Bibsonomy RAIRO Theor. Informatics Appl. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Georges Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir Lallali Model-Based Attack Tolerance. Search on Bibsonomy AINA Workshops The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Gunes Ercal A Note on the Computational Complexity of Unsmoothened Vertex Attack Tolerance. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
15Georges Ouffoue, Antonio M. Ortiz, Ana R. Cavalli, Wissam Mallouli, Josep Domingo-Ferrer, David Sánchez 0001, Fatiha Zaïdi Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach. Search on Bibsonomy ICDCS Workshops The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Jeffrey Borwey, Darla Ahlert, Tayo Obafemi-Ajayi, Gunes Ercal A Graph-Theoretic Clustering Methodology Based on Vertex-Attack Tolerance. Search on Bibsonomy FLAIRS The full citation details ... 2015 DBLP  BibTeX  RDF
15John Matta, Jeffrey Borwey, Gunes Ercal Comparative Resilience Notions and Vertex Attack Tolerance of Scale-Free Networks. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
15Gunes Ercal On Vertex Attack Tolerance in Regular Graphs. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
15Nicolas Stefanovitch, Aamena Alshamsi, Manuel Cebrián, Iyad Rahwan Error and attack tolerance of collective problem solving: The DARPA Shredder Challenge. Search on Bibsonomy EPJ Data Sci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Fengyun Li, Huan Zhang, Fuxiang Gao, Peng Li Location estimation for wireless sensor networks with attack tolerance. Search on Bibsonomy Int. J. Wirel. Mob. Comput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Mahdi Jalili Error and attack tolerance of small-worldness in complex networks. Search on Bibsonomy J. Informetrics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Zehui Qu, Pu Wang, Zhiguang Qin Enhancing the Scale-Free Network's Attack Tolerance. Search on Bibsonomy Complex (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intentional attack, network, robustness, Complex network, scale-free network
15Shangping Ren, Yue Yu 0002, Kevin A. Kwiat, Jeffrey J. P. Tsai A Coordination Model for Improving Software System Attack-Tolerance and Survivability in Open Hostile Environments. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Kevin A. Kwiat, Shangping Ren A Coordination Model for Improving Software System Attack-tolerance and Survivability in Open Hostile Environments. Search on Bibsonomy SUTC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Yunwen Yang Software-implemented attack tolerance for critical information retrieval. Search on Bibsonomy 2004   RDF
12Yanxiang He, Qiang Cao, Yi Han, Libing Wu, Tao Liu Reduction of Quality (RoQ) attacks on structured peer-to-peer networks. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Jin Han, Debin Gao, Robert H. Deng On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Xinli Huang, Futai Zou, Fan-Yuan Ma Targeted Local Immunization in Scale-Free Peer-to-Peer Networks. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF targeted local immunization, efficiency, peer-to-peer networks, cost, rate control, scale-free, overlay topology
8Balachander Krishnamurthy, Walter Willinger What are our standards for validation of measurement-based networking research? Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
8Yi Xin Su, Jimson Mathew, Jawar Singh, Dhiraj K. Pradhan Pseudo parallel architecture for AES with error correction. Search on Bibsonomy SoCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #40 of 40 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license