The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase intrusion-tolerant (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1990-2002 (23) 2003 (20) 2004 (22) 2005 (19) 2006 (19) 2007-2008 (28) 2009-2010 (21) 2011-2012 (16) 2013-2015 (15) 2016-2018 (16) 2019-2021 (15) 2022-2023 (3)
Publication types (Num. hits)
article(57) inproceedings(158) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 107 occurrences of 63 keywords

Results
Found 217 publication records. Showing 217 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
65David Sames, Brian Matt, Brian Niebuhr, Gregg Tally, Brent Whitmore, David E. Bakken Developing a Heterogeneous Intrusion Tolerant CORBA System. Search on Bibsonomy DSN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
64Myung-Kyu Yi, Chong-Sun Hwang A Rollback Recovery Algorithm for Intrusion Tolerant Intrusion Detection System. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
61Alex Hai Wang, Peng Liu 0005 Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
57Sankalp Singh, Michel Cukier, William H. Sanders Probabilistic Validation of an Intrusion-Tolerant Replication System. Search on Bibsonomy DSN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
53Liwei Kuang, Mohammad Zulkernine An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intrusion detection systems, Intrusion-tolerance
53Zahra Aghajani, Mohammad Abdollahi Azgomi Security Evaluation of an Intrusion Tolerant Web Service Architecture Using Stochastic Activity Networks. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intrusion tolerant web service (ITWS), stochastic activity networks (SANs), Security, modeling, evaluation
45Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe An Architecture for an Adaptive Intrusion-Tolerant Server. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
45Ryutaro Fujimoto, Hiroyuki Okamura, Tadashi Dohi Security Evaluation of an Intrusion Tolerant System with MRSPNs. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
45Narasimha Prasad Subraveti, Soontaree Tanaraksiritavorn, Shivakant Mishra Flexible Intrusion Tolerant Group Membership Protocol. Search on Bibsonomy ICPADS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
44Khin Mi Mi Aung, Kiejin Park, Jong Sou Park A Model of ITS Using Cold Standby Cluster. Search on Bibsonomy ICADL The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Concepts and Models, Intrusion Tolerant System, Security, Cluster System, Rejuvenation
43Yuanbo Guo, Jianfeng Ma 0001 An intrusion-tolerant authorization and authentication scheme in distributed environments. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF authorization and authentication, intrusion-tolerant, verifiable secret sharing
41Robert J. Stroud, Ian S. Welch, John P. Warne, Peter Y. A. Ryan A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
40Paulo Veríssimo, Nuno Ferreira Neves, Christian Cachin, Jonathan A. Poritz, David Powell, Yves Deswarte, Robert J. Stroud, Ian Welch Intrusion-tolerant middleware: the road to automatic security. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Kaile Su, Congxin Zhao, Guanfeng Lv, Han Lin, Qingliang Chen Formal Analysis and Improvement of the State Transition Model for Intrusion Tolerant System. Search on Bibsonomy WINE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
40Peng Liu 0005 Architectures for Intrusion Tolerant Database Systems. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
39Paulo Sousa 0001, Nuno Ferreira Neves, Paulo Veríssimo How Resilient are Distributed f Fault/Intrusion-Tolerant Systems? Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
38Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Bharat B. Madan, Katerina Goseva-Popstojanova, Kalyanaraman Vaidyanathan, Kishor S. Trivedi Modeling and Quantification of Security Attributes of Software Systems. Search on Bibsonomy DSN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Miguel Correia 0001, Nuno Ferreira Neves, Paulo Veríssimo How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems. Search on Bibsonomy SRDS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Ruiping Ma, Liudong Xing, Howard E. Michel Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Mohamed Layouni, Jozef Hooman, Sofiène Tahar On the Correctness of an Intrusion-Tolerant Group Communication Protocol. Search on Bibsonomy CHARME The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
34Giuliana Santos Veronese, Miguel Correia 0001, Lau Cheuk Lung, Paulo Veríssimo Finite Memory: A Vulnerability of Intrusion-Tolerant Systems. Search on Bibsonomy NCA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Garbage Collection, Buffer Management, Intrusion Tolerance, Byzantine Fault Tolerance
34Toshikazu Uemura, Tadashi Dohi Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks Via Semi-Markov Cost Models. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF long-run average cost, information security, intrusion tolerance, preventive maintenance, semi-Markov models, DoS attack
34Jin Wook Lee, Yann-Hang Lee ITB: Intrusion-Tolerant Broadcast Protocol in Wireless Sensor Networks. Search on Bibsonomy HPCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Chao Wang 0085, Jianfeng Ma 0001 Availability Analysis and Comparison of Different Intrusion-Tolerant Systems. Search on Bibsonomy AWCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33Yan Wen, Jinjing Zhao, Huaimin Wang A Novel Intrusion-Tolerant Approach for Internet Access. Search on Bibsonomy ISIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF local-booting technology, virtual machine, intrusion tolerant
33Weidong Shi, Hsien-Hsin S. Lee, Guofei Gu, Laura Falk, Trevor N. Mudge, Mrinmoy Ghosh An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor. Search on Bibsonomy ICAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Intrusion-tolerant computing, survivable service, buffer overflow, self-healing, rootkits, chip multi processor
31Miguel Correia 0001, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo Low complexity Byzantine-resilient consensus. Search on Bibsonomy Distributed Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF distributed systems models, distributed algorithms, consensus, intrusion tolerance, Byzantine fault tolerance
30Paulo Sousa 0001, Nuno Ferreira Neves, Paulo Veríssimo, William H. Sanders Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available. Search on Bibsonomy SRDS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30HariGovind V. Ramasamy, Adnan Agbaria, William H. Sanders CoBFIT: A Component-Based Framework for Intrusion Tolerance. Search on Bibsonomy EUROMICRO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Wankyung Kim, Wooyoung Soh, Hwangrae Kim, Jinsub Park Development of a Monitoring Module for ITS (Intrusion Tolerant System). Search on Bibsonomy KES (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Lihua Yin, Binxing Fang, Xiang-Zhan Yu Distributed Group Membership Algorithm in Intrusion-Tolerant System. Search on Bibsonomy APWeb Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Liwu Zhang, Dengguo Feng Intrusion Tolerant CA Scheme with Cheaters Detection Ability. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Intrusion Tolerance, Proactive, Threshold Signature, CA
30Dae-Sik Choi, Eul-Gyu Im, Cheol Won Lee Intrusion-Tolerant System Design for Web Server Survivability. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF web services, survivability, intrusion tolerance
30Peng Liu Engineering a Distributed Intrusion Tolerant Database System Using COTS Components. Search on Bibsonomy DISCEX (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30James C. Reynolds, James E. Just, Ed Lawson, Larry A. Clough, Ryan Maglich, Karl N. Levitt The Design and Implementation of an Intrusion Tolerant System. Search on Bibsonomy DSN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Henrique Moniz, Nuno Ferreira Neves, Miguel Correia 0001, Paulo Veríssimo Randomized Intrusion-Tolerant Asynchronous Services. Search on Bibsonomy DSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27GangShin Lee, Chaetae Im, TaeJin Lee 0002, HyungJong Kim 0002, Dong Hoon Lee 0001 SITIS: Scalable Intrusion Tolerance Middleware for Internet Service Survivability. Search on Bibsonomy PCM (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF SITIS, Middle-ware, Voting, Intrusion Tolerance, Group Management
27Dick O'Brien, Rick Smith, Tammy Kappel, Clint Bitzer Intrusion Tolerance Via Network Layer Controls. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Eung Ki Park, Dae-Sik Choi, Eul-Gyu Im, Jung-Taek Seo, Dongkyu Kim Adaptive Architecture for Web Server Survivability. Search on Bibsonomy ADVIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF web services, survivability, intrusion tolerance
26Eung Ki Park, Dae-Sik Choi, Jung-Taek Seo, Choonsik Park, Dongkyu Kim Adaptation Enhanced Mechanism for Web Survivability. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF web services, survivability, intrusion tolerance
26Peng Liu 0005, Sushil Jajodia Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Damage Confinement, Database Security, Intrusion Tolerance
24Ayda Saïdane, Vincent Nicomette, Yves Deswarte The Design of a Generic Intrusion-Tolerant Architecture for Web Servers. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Toshikazu Uemura, Tadashi Dohi, Naoto Kaio Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes. Search on Bibsonomy CloudCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SITAR, detection mode, EMC approach, cloud computing circumstance, availability, intrusion tolerance, discrete-time modeling
24Toshikazu Uemura, Tadashi Dohi Optimizing Security Measures in an Intrusion Tolerant Database System. Search on Bibsonomy ISAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ITDB, dependable and secure service, rewarding availability, optimization, survivability, system integrity, semi-Markov models
24Fernando Carlos Pereira, Joni da Silva Fraga, Ricardo Felipe Custódio Self-Adaptable and Intrusion Tolerant Certificate Authority for Mobile Ad Hoc Networks. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Dynamic distributed systems, distributed certificate authority, Security, Mobile ad hoc networks, key management
24Ayda Saïdane A Reliable Context-Aware Intrusion Tolerant System. Search on Bibsonomy OTM Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Yuanzhuo Wang, Chuang Lin 0002, Yang Yang 0004, Junjie Lv, Yang Qu A Game-Based Intrusion Tolerant Mechanism for Grid Service. Search on Bibsonomy GCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Håvard D. Johansen, André Allavena, Robbert van Renesse Fireflies: scalable support for intrusion-tolerant network overlays. Search on Bibsonomy EuroSys The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Byoung Min Joon Intrusion-Tolerant Server Architecture for Survivable Services. Search on Bibsonomy J. Supercomput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF replicated server architecture, survivability, voting, intrusion-tolerance
24Yuanbo Guo, Jianfeng Ma 0001 A Study on the Secure and Intrusion-Tolerant Authorization and Authentication System Applied to the Distributed Environment. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Robbert van Renesse Using randomized techniques to build scalable intrusion-tolerant overlay networks (Keynote). Search on Bibsonomy CollaborateCom The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Fabrice Stevens, Tod Courtney, Sankalp Singh, Adnan Agbaria, John F. Meyer, William H. Sanders, Partha P. Pal Model-Based Validation of an Intrusion-Tolerant Information System. Search on Bibsonomy SRDS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Jing Deng 0002, Richard Han 0001, Shivakant Mishra A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. Search on Bibsonomy IPSN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Vishu Gupta, Vinh Vi Lam, HariGovind V. Ramasamy, William H. Sanders, Sankalp Singh Dependability and Performance Evaluation of Intrusion-Tolerant Server Architectures. Search on Bibsonomy LADC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Xunhua Wang, Mohammad Hossain Heydari, Hua Lin An Intrusion-Tolerant Password Authentication System. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF off-line dictionary attack, password-authenticated key exchange (PAKE), Intrusion tolerance
24Christian Cachin, Jonathan A. Poritz Secure Intrusion-tolerant Replication on the Internet. Search on Bibsonomy DSN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24HariGovind V. Ramasamy, Michel Cukier, William H. Sanders Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication System. Search on Bibsonomy PRDC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Alex Hai Wang, Peng Liu 0005, Lunquan Li Evaluating the survivability of Intrusion Tolerant Database systems and the impact of intrusion detection deficiencies. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Myung-Kyu Yi, Chong-Sun Hwang Intrusion-Tolerant Intrusion Detection System. Search on Bibsonomy ISI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Wang Jun, Meng Xiao-li Active Fault-Tolerant/Active Passive Intrusion-Tolerant H ∞ Cooperative Control of Discrete NCS under the Background of Big Data. Search on Bibsonomy Wirel. Commun. Mob. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Anatoliy Gorbenko, Vyacheslav S. Kharchenko, Olga Tarasyuk, Alexey Furmanov F(I)MEA-Technique of Web Services Analysis and Dependability Ensuring. Search on Bibsonomy RODIN Book The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Dengguo Feng, Ji Xiang Experiences on Intrusion Tolerance Distributed Systems. Search on Bibsonomy COMPSAC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Alex Hai Wang, Peng Liu 0005, Lunquan Li Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Feng Xian, Hai Jin 0001, Ke Liu, Zongfen Han A Mobile-Agent based Distributed Dynamic [mu]Firewall Architecture. Search on Bibsonomy ICPADS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Ge Fu, Hong Zhu 0003, Yingjiu Li A Robust Damage Assessment Model for Corrupted Database Systems. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Data integrity, database recovery, damage assessment
20Corrado Leita, Marc Dacier SGNET: A Worldwide Deployable Framework to Support the Analysis of Malware Threat Models. Search on Bibsonomy EDCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Paulo Sousa 0001, Alysson Neves Bessani, Miguel Correia 0001, Nuno Ferreira Neves, Paulo Veríssimo Resilient Intrusion Tolerance through Proactive and Reactive Recovery. Search on Bibsonomy PRDC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Paulo Sousa 0001, Nuno Ferreira Neves, Paulo Veríssimo Proactive resilience through architectural hybridization. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secret sharing, intrusion tolerance, proactive recovery
20HariGovind V. Ramasamy, Prashant Pandey 0005, James Lyons, Michel Cukier, William H. Sanders Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems. Search on Bibsonomy DSN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Yang Yu, Fanglu Guo, Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh A feather-weight virtual machine for windows applications. Search on Bibsonomy VEE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF namespace virtualization, virtual machine, copy on write, mobile code security, system call interception
18Flavio Lombardi, Roberto Di Pietro, Claudio Soriente CReW: Cloud Resilience for Windows Guests through Monitored Virtualization. Search on Bibsonomy SRDS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Resilience management and security issues in clouds, Resilience measurement studies, file and storage systems, Secure and intrusion tolerant systems, Operating systems
16Khin Mi Mi Aung, Kiejin Park, Jong Sou Park, Howon Kim 0001, Byungil Lee A Survivability Model for Cluster System Under DoS Attacks. Search on Bibsonomy HPCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Khin Mi Mi Aung, Kiejin Park, Jong Sou Park A Survivability Model for Cluster System. Search on Bibsonomy ICA3PP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Peng Liu 0005, Jiwu Jing, Pramote Luenam, Ying Wang, Lunquan Li, Supawadee Ingsriswang The Design and Implementation of a Self-Healing Database System. Search on Bibsonomy J. Intell. Inf. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF self-healing database systems, security, survivability
16Xianfeng Zhang, Feng Zhang, Zhiguang Qin, Jinde Liu ECC Based Intrusion Tolerance for Web Security. Search on Bibsonomy GCC (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe Dependable Intrusion Tolerance: Technology Demo. Search on Bibsonomy DISCEX (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Hai Jin 0001, Feng Xian, Zongfen Han, Shengli Li 0002 A Distributed Dynamic µFirewall Architecture with Mobile Agents and KeyNote Trust Management System. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Yang Yu, Hariharan Kolam, Lap-Chung Lam, Tzi-cker Chiueh Applications of a feather-weight virtual machine. Search on Bibsonomy VEE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF binary server, browser exploit, information theft, virtual machine, web crawler
15Rafael R. Obelheiro, Joni da Silva Fraga Overlay Network Topology Reconfiguration in Byzantine Settings. Search on Bibsonomy PRDC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Paulo Sousa 0001, Nuno Ferreira Neves, Paulo Veríssimo Resilient State Machine Replication. Search on Bibsonomy PRDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Scott D. Stoller Domain partitioning for open reactive systems. Search on Bibsonomy ISSTA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Nouhad Sanoussi, Kaouthar Chetioui, Ghizlane Orhanou, Said El Hajji 0001 ITC: Intrusion tolerant controller for multicontroller SDN architecture. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Tadeu Freitas, João Soares, Manuel Eduardo Correia, Rolando Martins Skynet: a Cyber-Aware Intrusion Tolerant Overseer. Search on Bibsonomy DSN-S The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Guohou Shan, Boxin Zhao, James R. Clavin, Haibin Zhang, Sisi Duan Poligraph: Intrusion-Tolerant and Distributed Fake News Detection System. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
14Luciano Barreto 0001, Joni da Silva Fraga, Frank Siqueira An intrusion tolerant identity provider with user attributes confidentiality. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
14Junjun Zheng, Hiroyuki Okamura, Tadashi Dohi, Kishor S. Trivedi Quantitative Security Evaluation of Intrusion Tolerant Systems With Markovian Arrivals. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
14Mazen Farid, Rohaya Latip, Masnida Hussin, Nor Asilah Wati Abdul Hamid A fault-intrusion-tolerant system and deadline-aware algorithm for scheduling scientific workflow in the cloud. Search on Bibsonomy PeerJ Comput. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
14Romaric Duvignau, Michel Raynal, Elad Michael Schiller Self-stabilizing Byzantine- and Intrusion-tolerant Consensus. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
14Kiavash Satvat, Maliheh Shirvanian, Nitesh Saxena PASSAT: Single Password Authenticated Secret-Shared Intrusion-Tolerant Storage with Server Transparency. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
14Lucian Trestioreanu, Cristina Nita-Rotaru, Aanchal Malhotra, Radu State SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
14Yawen Wang, Yunfei Guo, Wenbo Wang, Hao Liang, Shumin Huo INHIBITOR: An intrusion tolerant scheduling algorithm in cloud-based scientific workflow system. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
14Lucian Trestioreanu, Cristina Nita-Rotaru, Aanchal Malhotra, Radu State SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
14Yawen Wang, Yunfei Guo, Zehua Guo 0001, Wenyan Liu 0005, Chao Yang 0012 Protecting scientific workflows in clouds with an intrusion tolerant system. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Anatoliy Gorbenko, Alexander B. Romanovsky, Olga Tarasyuk, Oleksandr Biloborodov From Analyzing Operating System Vulnerabilities to Designing Multiversion Intrusion-Tolerant Architectures. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Nouhad Sanoussi, Ghizlane Orhanou, Said El Hajji 0001 A game theoretic approach based on intrusion tolerant systems. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Sisi Duan, Chao Liu 0039, Xin Wang, Yusen Wu, Shuai Xu, Yelena Yesha, Haibin Zhang Intrusion-Tolerant and Confidentiality-Preserving Publish/Subscribe Messaging. Search on Bibsonomy SRDS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Junjun Zheng, Hiroyuki Okamura, Tadashi Dohi Security Evaluation of a VM-Based Intrusion-Tolerant System with Pull-Type Patch Management. Search on Bibsonomy HASE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Amy Babay, John L. Schultz, Thomas Tantillo, Samuel Beckley, Eamon Jordan, Kevin Ruddell, Kevin Jordan, Yair Amir Deploying Intrusion-Tolerant SCADA for the Power Grid. Search on Bibsonomy DSN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Yongjae Lee, Seunghyeon Lee, Hyunmin Seo, Changhoon Yoon, Seungwon Shin, Hyunsoo Yoon Duo: Software Defined Intrusion Tolerant System Using Dual Cluster. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 217 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license