|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 107 occurrences of 63 keywords
|
|
|
Results
Found 217 publication records. Showing 217 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
65 | David Sames, Brian Matt, Brian Niebuhr, Gregg Tally, Brent Whitmore, David E. Bakken |
Developing a Heterogeneous Intrusion Tolerant CORBA System. |
DSN |
2002 |
DBLP DOI BibTeX RDF |
|
64 | Myung-Kyu Yi, Chong-Sun Hwang |
A Rollback Recovery Algorithm for Intrusion Tolerant Intrusion Detection System. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
|
61 | Alex Hai Wang, Peng Liu 0005 |
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Sankalp Singh, Michel Cukier, William H. Sanders |
Probabilistic Validation of an Intrusion-Tolerant Replication System. |
DSN |
2003 |
DBLP DOI BibTeX RDF |
|
53 | Liwei Kuang, Mohammad Zulkernine |
An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Intrusion detection systems, Intrusion-tolerance |
53 | Zahra Aghajani, Mohammad Abdollahi Azgomi |
Security Evaluation of an Intrusion Tolerant Web Service Architecture Using Stochastic Activity Networks. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
intrusion tolerant web service (ITWS), stochastic activity networks (SANs), Security, modeling, evaluation |
45 | Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe |
An Architecture for an Adaptive Intrusion-Tolerant Server. |
Security Protocols Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
45 | Ryutaro Fujimoto, Hiroyuki Okamura, Tadashi Dohi |
Security Evaluation of an Intrusion Tolerant System with MRSPNs. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
45 | Narasimha Prasad Subraveti, Soontaree Tanaraksiritavorn, Shivakant Mishra |
Flexible Intrusion Tolerant Group Membership Protocol. |
ICPADS |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Khin Mi Mi Aung, Kiejin Park, Jong Sou Park |
A Model of ITS Using Cold Standby Cluster. |
ICADL |
2005 |
DBLP DOI BibTeX RDF |
Concepts and Models, Intrusion Tolerant System, Security, Cluster System, Rejuvenation |
43 | Yuanbo Guo, Jianfeng Ma 0001 |
An intrusion-tolerant authorization and authentication scheme in distributed environments. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
authorization and authentication, intrusion-tolerant, verifiable secret sharing |
41 | Robert J. Stroud, Ian S. Welch, John P. Warne, Peter Y. A. Ryan |
A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture. |
DSN |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Paulo Veríssimo, Nuno Ferreira Neves, Christian Cachin, Jonathan A. Poritz, David Powell, Yves Deswarte, Robert J. Stroud, Ian Welch |
Intrusion-tolerant middleware: the road to automatic security. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Kaile Su, Congxin Zhao, Guanfeng Lv, Han Lin, Qingliang Chen |
Formal Analysis and Improvement of the State Transition Model for Intrusion Tolerant System. |
WINE |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Peng Liu 0005 |
Architectures for Intrusion Tolerant Database Systems. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
39 | Paulo Sousa 0001, Nuno Ferreira Neves, Paulo Veríssimo |
How Resilient are Distributed f Fault/Intrusion-Tolerant Systems? |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford |
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Bharat B. Madan, Katerina Goseva-Popstojanova, Kalyanaraman Vaidyanathan, Kishor S. Trivedi |
Modeling and Quantification of Security Attributes of Software Systems. |
DSN |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Miguel Correia 0001, Nuno Ferreira Neves, Paulo Veríssimo |
How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems. |
SRDS |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Ruiping Ma, Liudong Xing, Howard E. Michel |
Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks. |
DASC |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Mohamed Layouni, Jozef Hooman, Sofiène Tahar |
On the Correctness of an Intrusion-Tolerant Group Communication Protocol. |
CHARME |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Giuliana Santos Veronese, Miguel Correia 0001, Lau Cheuk Lung, Paulo Veríssimo |
Finite Memory: A Vulnerability of Intrusion-Tolerant Systems. |
NCA |
2008 |
DBLP DOI BibTeX RDF |
Garbage Collection, Buffer Management, Intrusion Tolerance, Byzantine Fault Tolerance |
34 | Toshikazu Uemura, Tadashi Dohi |
Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks Via Semi-Markov Cost Models. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
long-run average cost, information security, intrusion tolerance, preventive maintenance, semi-Markov models, DoS attack |
34 | Jin Wook Lee, Yann-Hang Lee |
ITB: Intrusion-Tolerant Broadcast Protocol in Wireless Sensor Networks. |
HPCC |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Chao Wang 0085, Jianfeng Ma 0001 |
Availability Analysis and Comparison of Different Intrusion-Tolerant Systems. |
AWCC |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Yan Wen, Jinjing Zhao, Huaimin Wang |
A Novel Intrusion-Tolerant Approach for Internet Access. |
ISIP |
2008 |
DBLP DOI BibTeX RDF |
local-booting technology, virtual machine, intrusion tolerant |
33 | Weidong Shi, Hsien-Hsin S. Lee, Guofei Gu, Laura Falk, Trevor N. Mudge, Mrinmoy Ghosh |
An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor. |
ICAC |
2005 |
DBLP DOI BibTeX RDF |
Intrusion-tolerant computing, survivable service, buffer overflow, self-healing, rootkits, chip multi processor |
31 | Miguel Correia 0001, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo |
Low complexity Byzantine-resilient consensus. |
Distributed Comput. |
2005 |
DBLP DOI BibTeX RDF |
distributed systems models, distributed algorithms, consensus, intrusion tolerance, Byzantine fault tolerance |
30 | Paulo Sousa 0001, Nuno Ferreira Neves, Paulo Veríssimo, William H. Sanders |
Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available. |
SRDS |
2006 |
DBLP DOI BibTeX RDF |
|
30 | HariGovind V. Ramasamy, Adnan Agbaria, William H. Sanders |
CoBFIT: A Component-Based Framework for Intrusion Tolerance. |
EUROMICRO |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Wankyung Kim, Wooyoung Soh, Hwangrae Kim, Jinsub Park |
Development of a Monitoring Module for ITS (Intrusion Tolerant System). |
KES (3) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Lihua Yin, Binxing Fang, Xiang-Zhan Yu |
Distributed Group Membership Algorithm in Intrusion-Tolerant System. |
APWeb Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Liwu Zhang, Dengguo Feng |
Intrusion Tolerant CA Scheme with Cheaters Detection Ability. |
ISPA Workshops |
2005 |
DBLP DOI BibTeX RDF |
Intrusion Tolerance, Proactive, Threshold Signature, CA |
30 | Dae-Sik Choi, Eul-Gyu Im, Cheol Won Lee |
Intrusion-Tolerant System Design for Web Server Survivability. |
WISA |
2003 |
DBLP DOI BibTeX RDF |
web services, survivability, intrusion tolerance |
30 | Peng Liu |
Engineering a Distributed Intrusion Tolerant Database System Using COTS Components. |
DISCEX (2) |
2003 |
DBLP DOI BibTeX RDF |
|
30 | James C. Reynolds, James E. Just, Ed Lawson, Larry A. Clough, Ryan Maglich, Karl N. Levitt |
The Design and Implementation of an Intrusion Tolerant System. |
DSN |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Henrique Moniz, Nuno Ferreira Neves, Miguel Correia 0001, Paulo Veríssimo |
Randomized Intrusion-Tolerant Asynchronous Services. |
DSN |
2006 |
DBLP DOI BibTeX RDF |
|
27 | GangShin Lee, Chaetae Im, TaeJin Lee 0002, HyungJong Kim 0002, Dong Hoon Lee 0001 |
SITIS: Scalable Intrusion Tolerance Middleware for Internet Service Survivability. |
PCM (1) |
2004 |
DBLP DOI BibTeX RDF |
SITIS, Middle-ware, Voting, Intrusion Tolerance, Group Management |
27 | Dick O'Brien, Rick Smith, Tammy Kappel, Clint Bitzer |
Intrusion Tolerance Via Network Layer Controls. |
DISCEX (1) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Eung Ki Park, Dae-Sik Choi, Eul-Gyu Im, Jung-Taek Seo, Dongkyu Kim |
Adaptive Architecture for Web Server Survivability. |
ADVIS |
2004 |
DBLP DOI BibTeX RDF |
web services, survivability, intrusion tolerance |
26 | Eung Ki Park, Dae-Sik Choi, Jung-Taek Seo, Choonsik Park, Dongkyu Kim |
Adaptation Enhanced Mechanism for Web Survivability. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
web services, survivability, intrusion tolerance |
26 | Peng Liu 0005, Sushil Jajodia |
Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance. |
CSFW |
2001 |
DBLP DOI BibTeX RDF |
Damage Confinement, Database Security, Intrusion Tolerance |
24 | Ayda Saïdane, Vincent Nicomette, Yves Deswarte |
The Design of a Generic Intrusion-Tolerant Architecture for Web Servers. |
IEEE Trans. Dependable Secur. Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Toshikazu Uemura, Tadashi Dohi, Naoto Kaio |
Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes. |
CloudCom |
2009 |
DBLP DOI BibTeX RDF |
SITAR, detection mode, EMC approach, cloud computing circumstance, availability, intrusion tolerance, discrete-time modeling |
24 | Toshikazu Uemura, Tadashi Dohi |
Optimizing Security Measures in an Intrusion Tolerant Database System. |
ISAS |
2008 |
DBLP DOI BibTeX RDF |
ITDB, dependable and secure service, rewarding availability, optimization, survivability, system integrity, semi-Markov models |
24 | Fernando Carlos Pereira, Joni da Silva Fraga, Ricardo Felipe Custódio |
Self-Adaptable and Intrusion Tolerant Certificate Authority for Mobile Ad Hoc Networks. |
AINA |
2008 |
DBLP DOI BibTeX RDF |
Dynamic distributed systems, distributed certificate authority, Security, Mobile ad hoc networks, key management |
24 | Ayda Saïdane |
A Reliable Context-Aware Intrusion Tolerant System. |
OTM Workshops (2) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Yuanzhuo Wang, Chuang Lin 0002, Yang Yang 0004, Junjie Lv, Yang Qu |
A Game-Based Intrusion Tolerant Mechanism for Grid Service. |
GCC |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Håvard D. Johansen, André Allavena, Robbert van Renesse |
Fireflies: scalable support for intrusion-tolerant network overlays. |
EuroSys |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Byoung Min Joon |
Intrusion-Tolerant Server Architecture for Survivable Services. |
J. Supercomput. |
2005 |
DBLP DOI BibTeX RDF |
replicated server architecture, survivability, voting, intrusion-tolerance |
24 | Yuanbo Guo, Jianfeng Ma 0001 |
A Study on the Secure and Intrusion-Tolerant Authorization and Authentication System Applied to the Distributed Environment. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Robbert van Renesse |
Using randomized techniques to build scalable intrusion-tolerant overlay networks (Keynote). |
CollaborateCom |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Fabrice Stevens, Tod Courtney, Sankalp Singh, Adnan Agbaria, John F. Meyer, William H. Sanders, Partha P. Pal |
Model-Based Validation of an Intrusion-Tolerant Information System. |
SRDS |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Jing Deng 0002, Richard Han 0001, Shivakant Mishra |
A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. |
IPSN |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Vishu Gupta, Vinh Vi Lam, HariGovind V. Ramasamy, William H. Sanders, Sankalp Singh |
Dependability and Performance Evaluation of Intrusion-Tolerant Server Architectures. |
LADC |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Xunhua Wang, Mohammad Hossain Heydari, Hua Lin |
An Intrusion-Tolerant Password Authentication System. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
off-line dictionary attack, password-authenticated key exchange (PAKE), Intrusion tolerance |
24 | Christian Cachin, Jonathan A. Poritz |
Secure Intrusion-tolerant Replication on the Internet. |
DSN |
2002 |
DBLP DOI BibTeX RDF |
|
24 | HariGovind V. Ramasamy, Michel Cukier, William H. Sanders |
Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication System. |
PRDC |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Alex Hai Wang, Peng Liu 0005, Lunquan Li |
Evaluating the survivability of Intrusion Tolerant Database systems and the impact of intrusion detection deficiencies. |
Int. J. Inf. Comput. Secur. |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Myung-Kyu Yi, Chong-Sun Hwang |
Intrusion-Tolerant Intrusion Detection System. |
ISI |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Wang Jun, Meng Xiao-li |
Active Fault-Tolerant/Active Passive Intrusion-Tolerant H ∞ Cooperative Control of Discrete NCS under the Background of Big Data. |
Wirel. Commun. Mob. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Anatoliy Gorbenko, Vyacheslav S. Kharchenko, Olga Tarasyuk, Alexey Furmanov |
F(I)MEA-Technique of Web Services Analysis and Dependability Ensuring. |
RODIN Book |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Dengguo Feng, Ji Xiang |
Experiences on Intrusion Tolerance Distributed Systems. |
COMPSAC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Alex Hai Wang, Peng Liu 0005, Lunquan Li |
Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Feng Xian, Hai Jin 0001, Ke Liu, Zongfen Han |
A Mobile-Agent based Distributed Dynamic [mu]Firewall Architecture. |
ICPADS |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Ge Fu, Hong Zhu 0003, Yingjiu Li |
A Robust Damage Assessment Model for Corrupted Database Systems. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
Data integrity, database recovery, damage assessment |
20 | Corrado Leita, Marc Dacier |
SGNET: A Worldwide Deployable Framework to Support the Analysis of Malware Threat Models. |
EDCC |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Paulo Sousa 0001, Alysson Neves Bessani, Miguel Correia 0001, Nuno Ferreira Neves, Paulo Veríssimo |
Resilient Intrusion Tolerance through Proactive and Reactive Recovery. |
PRDC |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Paulo Sousa 0001, Nuno Ferreira Neves, Paulo Veríssimo |
Proactive resilience through architectural hybridization. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
secret sharing, intrusion tolerance, proactive recovery |
20 | HariGovind V. Ramasamy, Prashant Pandey 0005, James Lyons, Michel Cukier, William H. Sanders |
Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems. |
DSN |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Yang Yu, Fanglu Guo, Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh |
A feather-weight virtual machine for windows applications. |
VEE |
2006 |
DBLP DOI BibTeX RDF |
namespace virtualization, virtual machine, copy on write, mobile code security, system call interception |
18 | Flavio Lombardi, Roberto Di Pietro, Claudio Soriente |
CReW: Cloud Resilience for Windows Guests through Monitored Virtualization. |
SRDS |
2010 |
DBLP DOI BibTeX RDF |
Resilience management and security issues in clouds, Resilience measurement studies, file and storage systems, Secure and intrusion tolerant systems, Operating systems |
16 | Khin Mi Mi Aung, Kiejin Park, Jong Sou Park, Howon Kim 0001, Byungil Lee |
A Survivability Model for Cluster System Under DoS Attacks. |
HPCC |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Khin Mi Mi Aung, Kiejin Park, Jong Sou Park |
A Survivability Model for Cluster System. |
ICA3PP |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Peng Liu 0005, Jiwu Jing, Pramote Luenam, Ying Wang, Lunquan Li, Supawadee Ingsriswang |
The Design and Implementation of a Self-Healing Database System. |
J. Intell. Inf. Syst. |
2004 |
DBLP DOI BibTeX RDF |
self-healing database systems, security, survivability |
16 | Xianfeng Zhang, Feng Zhang, Zhiguang Qin, Jinde Liu |
ECC Based Intrusion Tolerance for Web Security. |
GCC (1) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe |
Dependable Intrusion Tolerance: Technology Demo. |
DISCEX (2) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Hai Jin 0001, Feng Xian, Zongfen Han, Shengli Li 0002 |
A Distributed Dynamic µFirewall Architecture with Mobile Agents and KeyNote Trust Management System. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
|
15 | Yang Yu, Hariharan Kolam, Lap-Chung Lam, Tzi-cker Chiueh |
Applications of a feather-weight virtual machine. |
VEE |
2008 |
DBLP DOI BibTeX RDF |
binary server, browser exploit, information theft, virtual machine, web crawler |
15 | Rafael R. Obelheiro, Joni da Silva Fraga |
Overlay Network Topology Reconfiguration in Byzantine Settings. |
PRDC |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Paulo Sousa 0001, Nuno Ferreira Neves, Paulo Veríssimo |
Resilient State Machine Replication. |
PRDC |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Scott D. Stoller |
Domain partitioning for open reactive systems. |
ISSTA |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Nouhad Sanoussi, Kaouthar Chetioui, Ghizlane Orhanou, Said El Hajji 0001 |
ITC: Intrusion tolerant controller for multicontroller SDN architecture. |
Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Tadeu Freitas, João Soares, Manuel Eduardo Correia, Rolando Martins |
Skynet: a Cyber-Aware Intrusion Tolerant Overseer. |
DSN-S |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Guohou Shan, Boxin Zhao, James R. Clavin, Haibin Zhang, Sisi Duan |
Poligraph: Intrusion-Tolerant and Distributed Fake News Detection System. |
IEEE Trans. Inf. Forensics Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
14 | Luciano Barreto 0001, Joni da Silva Fraga, Frank Siqueira |
An intrusion tolerant identity provider with user attributes confidentiality. |
J. Inf. Secur. Appl. |
2021 |
DBLP DOI BibTeX RDF |
|
14 | Junjun Zheng, Hiroyuki Okamura, Tadashi Dohi, Kishor S. Trivedi |
Quantitative Security Evaluation of Intrusion Tolerant Systems With Markovian Arrivals. |
IEEE Trans. Reliab. |
2021 |
DBLP DOI BibTeX RDF |
|
14 | Mazen Farid, Rohaya Latip, Masnida Hussin, Nor Asilah Wati Abdul Hamid |
A fault-intrusion-tolerant system and deadline-aware algorithm for scheduling scientific workflow in the cloud. |
PeerJ Comput. Sci. |
2021 |
DBLP DOI BibTeX RDF |
|
14 | Romaric Duvignau, Michel Raynal, Elad Michael Schiller |
Self-stabilizing Byzantine- and Intrusion-tolerant Consensus. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
14 | Kiavash Satvat, Maliheh Shirvanian, Nitesh Saxena |
PASSAT: Single Password Authenticated Secret-Shared Intrusion-Tolerant Storage with Server Transparency. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
14 | Lucian Trestioreanu, Cristina Nita-Rotaru, Aanchal Malhotra, Radu State |
SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
14 | Yawen Wang, Yunfei Guo, Wenbo Wang, Hao Liang, Shumin Huo |
INHIBITOR: An intrusion tolerant scheduling algorithm in cloud-based scientific workflow system. |
Future Gener. Comput. Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
14 | Lucian Trestioreanu, Cristina Nita-Rotaru, Aanchal Malhotra, Radu State |
SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay. |
CNS |
2021 |
DBLP DOI BibTeX RDF |
|
14 | Yawen Wang, Yunfei Guo, Zehua Guo 0001, Wenyan Liu 0005, Chao Yang 0012 |
Protecting scientific workflows in clouds with an intrusion tolerant system. |
IET Inf. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Anatoliy Gorbenko, Alexander B. Romanovsky, Olga Tarasyuk, Oleksandr Biloborodov |
From Analyzing Operating System Vulnerabilities to Designing Multiversion Intrusion-Tolerant Architectures. |
IEEE Trans. Reliab. |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Nouhad Sanoussi, Ghizlane Orhanou, Said El Hajji 0001 |
A game theoretic approach based on intrusion tolerant systems. |
Int. J. Secur. Networks |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Sisi Duan, Chao Liu 0039, Xin Wang, Yusen Wu, Shuai Xu, Yelena Yesha, Haibin Zhang |
Intrusion-Tolerant and Confidentiality-Preserving Publish/Subscribe Messaging. |
SRDS |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Junjun Zheng, Hiroyuki Okamura, Tadashi Dohi |
Security Evaluation of a VM-Based Intrusion-Tolerant System with Pull-Type Patch Management. |
HASE |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Amy Babay, John L. Schultz, Thomas Tantillo, Samuel Beckley, Eamon Jordan, Kevin Ruddell, Kevin Jordan, Yair Amir |
Deploying Intrusion-Tolerant SCADA for the Power Grid. |
DSN |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Yongjae Lee, Seunghyeon Lee, Hyunmin Seo, Changhoon Yoon, Seungwon Shin, Hyunsoo Yoon |
Duo: Software Defined Intrusion Tolerant System Using Dual Cluster. |
Secur. Commun. Networks |
2018 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 217 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ >>] |
|