Sciweavers

2587 search results - page 7 / 518
» Intrusion Tolerant Systems
Sort
View
CN
2007
224views more  CN 2007»
15 years 1 months ago
Automated adaptive intrusion containment in systems of interacting services
Large scale distributed systems typically have interactions among different services that create an avenue for propagation of a failure from one service to another. The failures ...
Yu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagc...
SECURWARE
2008
IEEE
15 years 8 months ago
ToLeRating UR-STD
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approac...
Jan Feyereisl, Uwe Aickelin
SEC
2008
15 years 3 months ago
Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs
Design diversity is a well-known method to ensure fault tolerance. Such a method has also been applied successfully in various projects to provide intrusion detection and tolerance...
Frédéric Majorczyk, Eric Totel, Ludo...
127
Voted
IPPS
2006
IEEE
15 years 7 months ago
Fault and intrusion tolerance of wireless sensor networks
The following three questions should be answered in developing new topology with more powerful ability to tolerate node-failure in wireless sensor network. First, what is node-fai...
Liang-min Wang, Jianfeng Ma, Chao Wang, A. C. Kot
CCGRID
2006
IEEE
15 years 8 months ago
Closing Cluster Attack Windows Through Server Redundancy and Rotations
— It is well-understood that increasing redundancy in a system generally improves the availability and dependability of the system. In server clusters, one important form of redu...
Yih Huang, David Arsenault, Arun Sood