The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase intrusion-tolerance (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1986-2002 (19) 2003 (18) 2004 (18) 2005-2006 (30) 2007-2008 (20) 2009-2010 (17) 2011-2012 (15) 2013-2015 (18) 2016-2024 (14)
Publication types (Num. hits)
article(38) inproceedings(129) phdthesis(2)
Venues (Conferences, Journals, ...)
DSN(8) ARES(5) NCA(5) SRDS(5) Security Protocols Workshop(4) ACSAC(3) DSN Workshops(3) Int. J. Netw. Secur.(3) NSPW(3) PRDC(3) S&P(3) ACNS(2) CoRR(2) DISCEX (2)(2) EDCC(2) ESORICS(2) More (+10 of total 118)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 149 occurrences of 81 keywords

Results
Found 169 publication records. Showing 169 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
93Liangmin Wang 0001, Jianfeng Ma 0001, Chao Wang 0085, A. C. Kot Fault and intrusion tolerance of wireless sensor networks. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
82Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough DSO: Dependable Signing Overlay. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF P2P overlay, digital signing service, fault-tolerance, dependable, intrusion-tolerance
68GangShin Lee, Chaetae Im, TaeJin Lee 0002, HyungJong Kim 0002, Dong Hoon Lee 0001 SITIS: Scalable Intrusion Tolerance Middleware for Internet Service Survivability. Search on Bibsonomy PCM (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF SITIS, Middle-ware, Voting, Intrusion Tolerance, Group Management
64Hyung-Jong Kim 0002 Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Atomic Vulnerability, DNS, Intrusion Tolerance, Vulnerability Analysis, DEVS formalism
61Robert J. Stroud, Ian S. Welch, John P. Warne, Peter Y. A. Ryan A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
60Kim Potter Kihlstrom, Priya Narasimhan The Starfish System: Providing Intrusion Detection and Intrusion Tolerance for Middleware Systems. Search on Bibsonomy WORDS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
58Rabih Zbib, Farooq Anjum, Abhrajit Ghosh, Amjad Umar Intrusion Tolerance in Distributed Middleware. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF secure middleware, middleware, intrusion tolerance
55Young-Soo Kim, Kab-Seung Kou, Gang-Soo Lee Intrusion Tolerance Model for Electronic Commerce System. Search on Bibsonomy FGCN (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
53Matthew Smith 0001, Christian Schridde, Bernd Freisleben Securing stateful grid servers through virtual server rotation. Search on Bibsonomy HPDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF self-cleansing servers, security, grid computing, virtualization, intrusion tolerance
51Miguel Correia 0001, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo Low complexity Byzantine-resilient consensus. Search on Bibsonomy Distributed Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF distributed systems models, distributed algorithms, consensus, intrusion tolerance, Byzantine fault tolerance
50Sankalp Singh, Michel Cukier, William H. Sanders Probabilistic Validation of an Intrusion-Tolerant Replication System. Search on Bibsonomy DSN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
47Yih Huang, David Arsenault, Arun Sood Incorruptible system self-cleansing for intrusion tolerance. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Bruno Dutertre, Valentin Crettaz, Victoria Stavridou Intrusion-Tolerant Enclaves. Search on Bibsonomy S&P The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Groupware, Secret sharing, Intrusion tolerance
43Michael E. Locasto, Ke Wang 0009, Angelos D. Keromytis, Salvatore J. Stolfo FLIPS: Hybrid Adaptive Intrusion Prevention. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Adaptive Response, Intrusion Tolerance, Intrusion Prevention
42Amel Meddeb, Yacine Djemaiel, Noureddine Boudriga Global intrusion detection and tolerance in networked systems. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF disk-based intrusion detection, global detection, local detection, tolerance, distributed attacks
41Alex Hai Wang, Peng Liu 0005 Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Salvatore D'Antonio, Simon Pietro Romano, Steven Simpson, Paul Smith 0001, David Hutchison 0001 A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks. Search on Bibsonomy IWSOS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Paulo Veríssimo Thou Shalt Not Trust non-Trustworthy Systems. Search on Bibsonomy ICDCS Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia 0001 Intrusion-Tolerant Architectures: Concepts and Design. Search on Bibsonomy WADS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
38Eung Ki Park, Dae-Sik Choi, Eul-Gyu Im, Jung-Taek Seo, Dongkyu Kim Adaptive Architecture for Web Server Survivability. Search on Bibsonomy ADVIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF web services, survivability, intrusion tolerance
38Eung Ki Park, Dae-Sik Choi, Jung-Taek Seo, Choonsik Park, Dongkyu Kim Adaptation Enhanced Mechanism for Web Survivability. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF web services, survivability, intrusion tolerance
37Dengguo Feng, Ji Xiang Experiences on Intrusion Tolerance Distributed Systems. Search on Bibsonomy COMPSAC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Guofei Gu, Bin B. Zhu, Shipeng Li 0001, Shiyong Zhang PLI: A New Framework to Protect Digital Content for P2P Networks. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF digital content protection, Public License Infrastructure (PLI), License Authority (LA), proactive shares update, distributed trust model, secret sharing, intrusion tolerance, Peer-to-Peer (P2P), Digital Rights Management (DRM)
33Ruiping Ma, Liudong Xing, Howard E. Michel Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Lin Chen, Zhitang Li, Cuixia Gao, Lan Liu 0003 Dynamic Forensics Based on Intrusion Tolerance. Search on Bibsonomy ISPA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dynamic forensics, finite state machine, intrusion tolerance
33Peng Liu 0005, Sushil Jajodia Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Damage Confinement, Database Security, Intrusion Tolerance
32Liwu Zhang, Dengguo Feng Intrusion Tolerant CA Scheme with Cheaters Detection Ability. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Intrusion Tolerance, Proactive, Threshold Signature, CA
32Dae-Sik Choi, Eul-Gyu Im, Cheol Won Lee Intrusion-Tolerant System Design for Web Server Survivability. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF web services, survivability, intrusion tolerance
32David Sames, Brian Matt, Brian Niebuhr, Gregg Tally, Brent Whitmore, David E. Bakken Developing a Heterogeneous Intrusion Tolerant CORBA System. Search on Bibsonomy DSN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
32Xianfeng Zhang, Feng Zhang, Zhiguang Qin, Jinde Liu ECC Based Intrusion Tolerance for Web Security. Search on Bibsonomy GCC (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe Dependable Intrusion Tolerance: Technology Demo. Search on Bibsonomy DISCEX (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32HariGovind V. Ramasamy, Prashant Pandey 0005, James Lyons, Michel Cukier, William H. Sanders Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems. Search on Bibsonomy DSN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Mohamed Layouni, Jozef Hooman, Sofiène Tahar On the Correctness of an Intrusion-Tolerant Group Communication Protocol. Search on Bibsonomy CHARME The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Miguel Correia 0001, Nuno Ferreira Neves, Paulo Veríssimo How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems. Search on Bibsonomy SRDS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe An Architecture for an Adaptive Intrusion-Tolerant Server. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26David Arsenault, Arun Sood, Yih Huang Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES). Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Bumjoo Park, Kiejin Park, Sungsoo Kim A Self-healing Mechanism for an Intrusion Tolerance System. Search on Bibsonomy TrustBus The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Michael Atighetchi, Partha P. Pal, Franklin Webber, Richard E. Schantz, Christopher C. Jones, Joseph P. Loyall Adaptive Cyberdefense for Survival and Intrusion Tolerance. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Jing Deng 0002, Richard Han 0001, Shivakant Mishra Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Haoran Liu, Rongrong Yin, Bin Liu 0044, Yaqian Li A scale-free topology model with fault-tolerance and intrusion-tolerance in wireless sensor networks. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Alysson Neves Bessani From Byzantine fault tolerance to intrusion tolerance (a position paper). Search on Bibsonomy DSN Workshops The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Paulo Veríssimo, Nuno Ferreira Neves, Christian Cachin, Jonathan A. Poritz, David Powell, Yves Deswarte, Robert J. Stroud, Ian Welch Intrusion-tolerant middleware: the road to automatic security. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Anatoliy Gorbenko, Vyacheslav S. Kharchenko, Olga Tarasyuk, Alexey Furmanov F(I)MEA-Technique of Web Services Analysis and Dependability Ensuring. Search on Bibsonomy RODIN Book The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Liang-Min Wang, Jian-Feng Ma 0001, Yong-Zhao Zhan Modelling intrusion for intrusion tolerance system by correlating alerts from IDS sensor. Search on Bibsonomy Int. J. Autom. Control. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Yih Huang, David Arsenault, Arun Sood Closing Cluster Attack Windows Through Server Redundancy and Rotations. Search on Bibsonomy CCGRID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Kaile Su, Congxin Zhao, Guanfeng Lv, Han Lin, Qingliang Chen Formal Analysis and Improvement of the State Transition Model for Intrusion Tolerant System. Search on Bibsonomy WINE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Peng Liu 0005 Architectures for Intrusion Tolerant Database Systems. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Tao Zhang 0037, Xiaotong Zhuang, Santosh Pande Building Intrusion-Tolerant Secure Software. Search on Bibsonomy CGO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum Support for multi-level security policies in DRM architectures. Search on Bibsonomy NSPW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Hassen Saïdi, Victoria Stavridou, Bruno Dutertre Protocol Codesign. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18John P. McDermott, Anya Kim, Judith N. Froscher Merging paradigms of survivability and security: stochastic faults and designed faults. Search on Bibsonomy NSPW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Quyen L. Nguyen, Arun Sood A Comparison of Intrusion-Tolerant System Architectures. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF D.0 General, D.2.4.d Formal methods, D.4.6.a Access controls, D.4.6.b Authentication, K.4.4.f Security, K.4.4.g Internet security policies, K.6.5.a Authentication, K.6.5.c Invasive software (viruses, worms, Trojan horses), K.6.5.e Unauthorized access (hacking, phreaking), K.6.m.b Security, C.4.f Reliability, D.2.9.m Risk management, D.4.5.e High availability, D.4.6.d Information flow controls, Data exfiltration, Intrusion Tolerance, availability and serviceability
17Paulo Sousa 0001, Alysson Neves Bessani, Miguel Correia 0001, Nuno Ferreira Neves, Paulo Veríssimo Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF reactive recovery, firewall, Intrusion tolerance, proactive recovery
17Alex Hai Wang, Su Yan 0001, Peng Liu 0005 A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Survivability, Database Security, Intrusion Tolerance, Semi-Markov Process, Modeling and Evaluation
17Valdir Stumm Jr., Lau Cheuk Lung, Miguel Correia 0001, Joni da Silva Fraga, Jim Lau Intrusion Tolerant Services Through Virtualization: A Shared Memory Approach. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Virtualization, Shared Memory, Intrusion Tolerance
17Raul Barbosa Monitoring Local Progress with Watchdog Timers Deduced from Global Properties. Search on Bibsonomy SRDS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF watchdogs, fault tolerance, distributed systems, model checking, intrusion tolerance, online monitoring
17Yih Huang, Anup K. Ghosh Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services. Search on Bibsonomy NCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF trustworhy computing, web server security, intrusion tolerance, service availability, automatic recovery
17Soontaree Tanaraksiritavorn, Shivakant Mishra A Privacy Preserving Intrusion Tolerant Voting Architecture. Search on Bibsonomy NCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF inexact voting, security, intrusion tolerance
17Michael Atighetchi, Partha P. Pal From Auto-adaptive to Survivable and Self-Regenerative Systems. Search on Bibsonomy NCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cognitive Algorithms, Autonomous Computing, Survivability, Information Assurance, Intrusion Tolerance
17Toshikazu Uemura, Tadashi Dohi, Naoto Kaio Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes. Search on Bibsonomy CloudCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SITAR, detection mode, EMC approach, cloud computing circumstance, availability, intrusion tolerance, discrete-time modeling
17Paul D. Ezhilchelvan, Dylan Clarke, Isi Mitrani, Santosh K. Shrivastava Proactive Fortification of Fault-Tolerant Services. Search on Bibsonomy OPODIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Primary-Backup, Code randomization, Replication, State machines, Intrusion tolerance, Agreement, Analytical evaluations
17Giuliana Santos Veronese, Miguel Correia 0001, Lau Cheuk Lung, Paulo Veríssimo Finite Memory: A Vulnerability of Intrusion-Tolerant Systems. Search on Bibsonomy NCA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Garbage Collection, Buffer Management, Intrusion Tolerance, Byzantine Fault Tolerance
17Liwei Kuang, Mohammad Zulkernine An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intrusion detection systems, Intrusion-tolerance
17Abdelraouf Ouadjaout, Yacine Challal, Noureddine Lasla, Miloud Bagaa SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Wireless sensor networks, Fault tolerance, Intrusion tolerance, Secure routing
17Håvard D. Johansen, Dag Johansen Resilient Software Mirroring With Untrusted Third Parties. Search on Bibsonomy HotSWUp The full citation details ... 2008 DBLP  DOI  BibTeX  RDF overlay network, intrusion-tolerance, software distribution, denial-of-service attack
17Alysson Neves Bessani, Hans P. Reiser, Paulo Sousa 0001, Ilir Gashi, Vladimir Stankovic 0002, Tobias Distler, Rüdiger Kapitza, Alessandro Daidone, Rafael R. Obelheiro FOREVER: Fault/intrusiOn REmoVal through Evolution & Recovery. Search on Bibsonomy Middleware (Companion) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF replication, intrusion tolerance, proactive recovery
17Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K. Iyer Inner-Circle Consistency for Wireless Ad Hoc Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, sensor networks, ad hoc networks, reliability, Intrusion tolerance
17HariGovind V. Ramasamy, Mouna Seri, William H. Sanders The coBFIT toolkit. Search on Bibsonomy PODC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF replication, intrusion tolerance, byzantine faults, software toolkit
17Toshikazu Uemura, Tadashi Dohi Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks Via Semi-Markov Cost Models. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF long-run average cost, information security, intrusion tolerance, preventive maintenance, semi-Markov models, DoS attack
17Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting System Call Monitoring Using Authenticated System Calls. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF operating systems, security policy, Intrusion tolerance, compiler techniques, sandboxing
17Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong Resource allocation for restoration of compromised systems. Search on Bibsonomy J. Comb. Optim. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF System restoration, Resource allocation, Intrusion tolerance, Internet worm, Cost analysis
17Paulo Sousa 0001, Nuno Ferreira Neves, Paulo Veríssimo Proactive resilience through architectural hybridization. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secret sharing, intrusion tolerance, proactive recovery
17Byoung Min Joon Intrusion-Tolerant Server Architecture for Survivable Services. Search on Bibsonomy J. Supercomput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF replicated server architecture, survivability, voting, intrusion-tolerance
17Yong-Joon Park, Gyungho Lee Repairing return address stack for buffer overflow protection. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF computer architecture, computer security, buffer overflow, intrusion tolerance
17Matti A. Hiltunen, Richard D. Schlichting, Carlos A. Ugarte Building Survivable Services Using Redundancy and Adaptation. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF distributed systems, adaptation, dependability, redundancy, Survivability, trustworthiness, intrusion tolerance
17Xunhua Wang, Mohammad Hossain Heydari, Hua Lin An Intrusion-Tolerant Password Authentication System. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF off-line dictionary attack, password-authenticated key exchange (PAKE), Intrusion tolerance
17Peng Liu 0005 DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Database Security, Intrusion Tolerance, Isolation
17Kim Hammar, Rolf Stadler Intrusion Tolerance for Networked Systems through Two-Level Feedback Control. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Zhanwang Zhu, Yiming Yuan, Song Deng Data Intrusion Tolerance Model based on Game Theory for Energy Internet. Search on Bibsonomy ICDM (Workshops) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Maher Khan, Amy Babay Making Intrusion Tolerance Accessible: A Cloud-Based Hybrid Management Approach to Deploying Resilient Systems. Search on Bibsonomy SRDS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Maher Khan, Amy Babay Toward Intrusion Tolerance as a Service: Confidentiality in Partially Cloud-Based BFT Systems. Search on Bibsonomy DSN The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
17Felicita Di Giandomenico, Giulio Masetti Basic Aspects in Redundancy-Based Intrusion Tolerance. Search on Bibsonomy CISIS-ICEUTE The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
17Fengquan Li A Markov-Based Intrusion Tolerance Finite Automaton. Search on Bibsonomy J. Comput. Inf. Technol. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
17Jian-Hua Huang, Liang-Jie Chen, Fan-Chao Li, Ze Fang Security Quantification Method for Intrusion Tolerance Systems Based on Multi-recovery. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2018 DBLP  BibTeX  RDF
17Jinhui Lei, Xiyan Tian, Zhixia Zhang Life Cycle and Intrusion Tolerance Optimization Topology Models for Wireless Sensor Networks. Search on Bibsonomy Int. J. Online Eng. The full citation details ... 2018 DBLP  BibTeX  RDF
17Christoph Lambert, Marcus Völp, Jeremie Decouchant, Paulo Jorge Esteves Veríssimo Towards Real-Time-Aware Intrusion Tolerance. Search on Bibsonomy SRDS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Ajay Nagarajan Realizing Cyber Resilience with Hybrid Intrusion Tolerance Architectures. Search on Bibsonomy 2018   RDF
17Zhi-yong Luo, Bo You, Peng Wang, Jie Su, Yi Liang Analysis and Optimization of System Intrusion Tolerance Capacity Based on Markov. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2017 DBLP  BibTeX  RDF
17Yichi Zhang, Lingfeng Wang 0001, Yingmeng Xiang Power System Reliability Analysis With Intrusion Tolerance in SCADA Systems. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Syrine Chatti, Habib Ounelli An Intrusion Tolerance Scheme for a Cloud of Databases Environment. Search on Bibsonomy NBiS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Maryam Tanha, Fazirulhisyam Hashim, Shamala Subramaniam Secure and Self-healing Control Centers of Critical Infrastructures using Intrusion Tolerance. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2015 DBLP  BibTeX  RDF
17Zuo Chen, Xue Li 0004, Bing Yang, Qian Zhang 0001 A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value. Search on Bibsonomy J. Sensors The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Houbao Xu Availability analysis for software system with intrusion tolerance. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Yu Jiang, Jie Huang 0016 An Intrusion Tolerance Method Based on Energy Attack for Wireless Sensor Network. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Cong Wang, Fengli Zhang A vote-based intrusion-tolerance algorithm for network latency estimation. Search on Bibsonomy Int. J. Comput. Appl. Technol. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Iman El Mir, Dong Seong Kim 0001, Abdelkrim Haqiq Security modeling and analysis of a self-cleansing intrusion tolerance technique. Search on Bibsonomy IAS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Zuo Chen, Xue Li 0004, Bin Lv, Mengyuan Jia A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Particle Swarm Optimization and Cuckoo Search. Search on Bibsonomy TrustCom/BigDataSE/ISPA (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Shamina Hossain, Sriharsha Etigowni, Kate Davis 0001, Saman A. Zonouz Towards cyber-physical intrusion tolerance. Search on Bibsonomy SmartGridComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Miguel Garcia, Alysson Neves Bessani, Ilir Gashi, Nuno Ferreira Neves, Rafael R. Obelheiro Analysis of operating system diversity for intrusion tolerance. Search on Bibsonomy Softw. Pract. Exp. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Tobias Distler Resource-efficient fault and intrusion tolerance. Search on Bibsonomy 2014   RDF
Displaying result #1 - #100 of 169 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license