-
1
-
-
1042277255
-
A method for modeling and quantifying the security attributes of intrusion tolerant systems
-
Madan BB, Popstojanova KG, Vaidyanathan K, Trivedi KS, A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation Journal 2004; 56(1-4): 167-186.
-
(2004)
Performance Evaluation Journal
, vol.56
, Issue.1-4
, pp. 167-186
-
-
Madan, B.B.1
Popstojanova, K.G.2
Vaidyanathan, K.3
Trivedi, K.S.4
-
2
-
-
84946228500
-
SITAR: A scalable intrusion-tolerant architecture for distributed services
-
Wang F, Gong F, Sargor C, Goseva-Popstojanova K, Trivedi K. SITAR: a scalable intrusion-tolerant architecture for distributed services. Proceedings of the Foundations of Intrusion Tolerant Systems (OASIS) 2003; 359-367.
-
(2003)
Proceedings of the Foundations of Intrusion Tolerant Systems (OASIS)
, pp. 359-367
-
-
Wang, F.1
Gong, F.2
Sargor, C.3
Goseva-Popstojanova, K.4
Trivedi, K.5
-
3
-
-
0742272501
-
An approach to intrusion tolerance for mission-critical services using adaptability and diverse replication
-
Min BJ, Choi JS. An approach to intrusion tolerance for mission-critical services using adaptability and diverse replication. Future Generation Computer Systems 2004; 20(2):303-313.
-
(2004)
Future Generation Computer Systems
, vol.20
, Issue.2
, pp. 303-313
-
-
Min, B.J.1
Choi, J.S.2
-
5
-
-
39349096703
-
Storage-based intrusion detection: Watching storage activity for suspicious behaviour
-
Washington, DC, August
-
Griffin JL, Soules CAN, Goodson GR, Pennington AG, Strunk JD, Ganger GR. Storage-based intrusion detection: watching storage activity for suspicious behaviour. Proceedings of the 12th USENIX Security Symposium, Washington, DC, August 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
-
-
Griffin, J.L.1
Soules, C.A.N.2
Goodson, G.R.3
Pennington, A.G.4
Strunk, J.D.5
Ganger, G.R.6
-
6
-
-
1542360009
-
Design implementation and evaluation of repairable file service
-
San Francisco, CA, U.S.A, June
-
Zhu N, Chiueh T. Design implementation and evaluation of repairable file service. The 2003 International Conference on Dependable Systems and Networks (DSN), San Francisco, CA, U.S.A., June 2003; 217-226.
-
(2003)
The 2003 International Conference on Dependable Systems and Networks (DSN)
, pp. 217-226
-
-
Zhu, N.1
Chiueh, T.2
-
7
-
-
27144528230
-
Storage-based intrusion detection for storage area networks
-
Monterey, CA, U.S.A, April
-
Banikazemi M, Poff D, Abali B. Storage-based intrusion detection for storage area networks. Proceedings of the 22nd IEEE/13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST), Monterey, CA, U.S.A., April 2005; 118-127.
-
(2005)
Proceedings of the 22nd IEEE/13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST)
, pp. 118-127
-
-
Banikazemi, M.1
Poff, D.2
Abali, B.3
-
8
-
-
34047233691
-
Research on object-storage-based intrusion detection
-
Minneapolis, MN, U.S.A
-
Zhang Y, Wang D. Research on object-storage-based intrusion detection. Proceedings of the 12th International Conference on Parallel and Distributed Systems, Minneapolis, MN, U.S.A., 2006; 68-78.
-
(2006)
Proceedings of the 12th International Conference on Parallel and Distributed Systems
, pp. 68-78
-
-
Zhang, Y.1
Wang, D.2
-
9
-
-
56749101865
-
Cooperative intrusion detection and tolerance system
-
Gammarth, Tunisia, December
-
Djemaiel Y, Rekhis S, Boudriga N. Cooperative intrusion detection and tolerance system. Proceedings of 12th IEEE International Conference on Electronics, Circuits and Systems (ICECS), Gammarth, Tunisia, December 2005; 297-300.
-
(2005)
Proceedings of 12th IEEE International Conference on Electronics, Circuits and Systems (ICECS)
, pp. 297-300
-
-
Djemaiel, Y.1
Rekhis, S.2
Boudriga, N.3
-
10
-
-
33746150390
-
Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art
-
Sobh TS. Wired and wireless intrusion detection system: classifications, good characteristics and state-of-the-art. Computer Standards and Interfaces 2006; 28(6):670-694.
-
(2006)
Computer Standards and Interfaces
, vol.28
, Issue.6
, pp. 670-694
-
-
Sobh, T.S.1
-
13
-
-
19944364877
-
Feature deduction and ensemble design of intrusion detection systems
-
Chebrolu S, Abraham A, Thomas JP. Feature deduction and ensemble design of intrusion detection systems. Computers and Security 2005; 24(4):295-307.
-
(2005)
Computers and Security
, vol.24
, Issue.4
, pp. 295-307
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.P.3
-
14
-
-
33847100622
-
Honeypot back-propagation for mitigating spoofing distributed denial-of-service attacks
-
Rhodes Island, Greece, April
-
Khattab S, Melhem R, Mosse D, Znati T. Honeypot back-propagation for mitigating spoofing distributed denial-of-service attacks. Proceedings of the 20th IEEE International Parallel & Distributed Processing Symposium, Rhodes Island, Greece, April 2006.
-
(2006)
Proceedings of the 20th IEEE International Parallel & Distributed Processing Symposium
-
-
Khattab, S.1
Melhem, R.2
Mosse, D.3
Znati, T.4
|