|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 28 occurrences of 28 keywords
|
|
|
Results
Found 40 publication records. Showing 40 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
27 | Lang Lin, Wayne P. Burleson |
Analysis and mitigation of process variation impacts on Power-Attack Tolerance. |
DAC |
2009 |
DBLP DOI BibTeX RDF |
process variation, differential power analysis, Monte Carlo simulation, transistor sizing |
24 | Mariana Segovia-Ferreira |
Cyber-resilience and attack tolerance for cyber-physical systems. (Cyber-résilience et tolérance aux attaques des systèmes cyber-physiques). |
|
2021 |
RDF |
|
24 | Georges Ouffoué |
Attack tolerance for services-based applications in the Cloud. (Tolérance aux attaques pour les applications orientées services Web dans le cloud). |
|
2018 |
RDF |
|
23 | Yasuhiro Sato, Shingo Ata, Ikuo Oka |
A strategic approach for re-organization of internet topology for improving both efficiency and attack tolerance. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Xinli Huang, Yin Li, Ruijun Yang, Fanyuan Ma |
Enhancing Attack Survivability of Gnutella-like P2P Networks by Targeted Immunization Scheme. |
PDCAT |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Adam J. O'Donnell, Harish Sethu |
On achieving software diversity for improved network security using distributed coloring algorithms. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
software monoculture, viruses and worms, network security, graph coloring, survivability, software diversity |
16 | Alexander W. Min, Kang G. Shin, Xin Hu 0001 |
Secure Cooperative Sensing in IEEE 802.22 WRANs Using Shadow Fading Correlation. |
IEEE Trans. Mob. Comput. |
2011 |
DBLP DOI BibTeX RDF |
shadowing correlation, attack tolerance, IEEE 802.22, sensing scheduling, Cognitive radio, cooperative sensing |
16 | Taejoon Park, Kang G. Shin |
Secure routing based on distributed key sharing in large-scale sensor networks. |
ACM Trans. Embed. Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Distributed key sharing and servers, attack tolerance, large-scale sensor networks, secure geographic forwarding, key establishment |
16 | Taejoon Park, Kang G. Shin |
Attack-tolerant localization via iterative verification of locations in sensor networks. |
ACM Trans. Embed. Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
attack-tolerance, sensor networks, localization, Anomaly detection, recursive least squares |
16 | Jie Xu 0007, Erica Y. Yang, Keith H. Bennett |
A Practical Approach to Secure Web Services. |
ISORC |
2006 |
DBLP DOI BibTeX RDF |
Attack tolerance, malicious attacks, Web services, privacy protection, distributed information retrieval |
16 | Yi Yuan, Hoong Kee Ng |
DATCONS: Protecting Web-Based QoS from DDoS Attacks. |
NOMS |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Chenrui Zhang, Yiming Jiang 0014, Shuang Shen, Rediet Tesfaye Zeru, Yuanqing Xia, Senchun Chai |
Inherent attack tolerance properties of model predictive control under DoS attacks. |
J. Frankl. Inst. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Yang Xia, Yan Xu 0005, Suman Mondal, Amit Kumar Gupta |
A Transfer Learning-Based Method for Cyber-Attack Tolerance in Distributed Control of Microgrids. |
IEEE Trans. Smart Grid |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Mohammad Taherifard, Mahdi Fazeli, Ahmad Patooghy |
Scan-based attack tolerance with minimum testability loss: a gate-level approach. |
IET Inf. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Wenbo Zhou, Philippe Dague, Lei Liu, Lina Ye, Fatiha Zaïdi |
A Coloured Petri Nets Based Attack Tolerance Framework. |
APSEC |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Michihiro Shintani, Tomoki Mino, Michiko Inoue |
LBIST-PUF: An LBIST Scheme Towards Efficient Challenge-Response Pairs Collection and Machine-Learning Attack Tolerance Improvement. |
ATS |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Georges Ouffoué, Fatiha Zaïdi, Ana R. Cavalli |
Attack Tolerance for Services-Based Applications in the Cloud. |
ICTSS |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Marcin Waniek, Kai Zhou 0001, Yevgeniy Vorobeychik, Esteban Moro, Tomasz P. Michalak, Talal Rahwan |
Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
15 | Philipp Richter, Mikko Valkama, Elena Simona Lohan |
Attack tolerance of RSS-based fingerprinting. |
WCNC |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Xiangwen Liu, Liangmin Wang 0001, Yuquan Zhu |
SLAT: Sub-Trajectory Linkage Attack Tolerance Framework for Privacy-Preserving Trajectory Publishing. |
NaNA |
2018 |
DBLP DOI BibTeX RDF |
|
15 | John Matta, Gunes Ercal, Jeffrey Borwey |
The vertex attack tolerance of complex networks. |
RAIRO Oper. Res. |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Vecdi Aytaç, Tufan Turaci |
Relationships between vertex attack tolerance and other vulnerability parameters. |
RAIRO Theor. Informatics Appl. |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Georges Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir Lallali |
Model-Based Attack Tolerance. |
AINA Workshops |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Gunes Ercal |
A Note on the Computational Complexity of Unsmoothened Vertex Attack Tolerance. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
15 | Georges Ouffoue, Antonio M. Ortiz, Ana R. Cavalli, Wissam Mallouli, Josep Domingo-Ferrer, David Sánchez 0001, Fatiha Zaïdi |
Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach. |
ICDCS Workshops |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Jeffrey Borwey, Darla Ahlert, Tayo Obafemi-Ajayi, Gunes Ercal |
A Graph-Theoretic Clustering Methodology Based on Vertex-Attack Tolerance. |
FLAIRS |
2015 |
DBLP BibTeX RDF |
|
15 | John Matta, Jeffrey Borwey, Gunes Ercal |
Comparative Resilience Notions and Vertex Attack Tolerance of Scale-Free Networks. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
15 | Gunes Ercal |
On Vertex Attack Tolerance in Regular Graphs. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
15 | Nicolas Stefanovitch, Aamena Alshamsi, Manuel Cebrián, Iyad Rahwan |
Error and attack tolerance of collective problem solving: The DARPA Shredder Challenge. |
EPJ Data Sci. |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Fengyun Li, Huan Zhang, Fuxiang Gao, Peng Li |
Location estimation for wireless sensor networks with attack tolerance. |
Int. J. Wirel. Mob. Comput. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Mahdi Jalili |
Error and attack tolerance of small-worldness in complex networks. |
J. Informetrics |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Zehui Qu, Pu Wang, Zhiguang Qin |
Enhancing the Scale-Free Network's Attack Tolerance. |
Complex (2) |
2009 |
DBLP DOI BibTeX RDF |
intentional attack, network, robustness, Complex network, scale-free network |
15 | Shangping Ren, Yue Yu 0002, Kevin A. Kwiat, Jeffrey J. P. Tsai |
A Coordination Model for Improving Software System Attack-Tolerance and Survivability in Open Hostile Environments. |
Int. J. Distributed Sens. Networks |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Kevin A. Kwiat, Shangping Ren |
A Coordination Model for Improving Software System Attack-tolerance and Survivability in Open Hostile Environments. |
SUTC (1) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Yunwen Yang |
Software-implemented attack tolerance for critical information retrieval. |
|
2004 |
RDF |
|
12 | Yanxiang He, Qiang Cao, Yi Han, Libing Wu, Tao Liu |
Reduction of Quality (RoQ) attacks on structured peer-to-peer networks. |
IPDPS |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Jin Han, Debin Gao, Robert H. Deng |
On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Xinli Huang, Futai Zou, Fan-Yuan Ma |
Targeted Local Immunization in Scale-Free Peer-to-Peer Networks. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
targeted local immunization, efficiency, peer-to-peer networks, cost, rate control, scale-free, overlay topology |
8 | Balachander Krishnamurthy, Walter Willinger |
What are our standards for validation of measurement-based networking research? |
SIGMETRICS Perform. Evaluation Rev. |
2008 |
DBLP DOI BibTeX RDF |
|
8 | Yi Xin Su, Jimson Mathew, Jawar Singh, Dhiraj K. Pradhan |
Pseudo parallel architecture for AES with error correction. |
SoCC |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #40 of 40 (100 per page; Change: )
|
|