-
1
-
-
84962309834
-
Survivability architectures: Issues and approaches
-
Los Alamitos, California
-
Knight, J. C. , Sullivan, K. , Elder, M. C. ,Wang, C. : "Survivability Architectures: Issues and Approaches, " In: Proc. of the DARPA Information Survivability Conference and Exposition, Los Alamitos, California, (2000) 157-171.
-
(2000)
Proc. of the DARPA Information Survivability Conference and Exposition
, pp. 157-171
-
-
Knight, J.C.1
Sullivan, K.2
Elder, M.C.3
Wang, C.4
-
2
-
-
12344313797
-
A strategy for information survivability
-
Vancouver, Canada
-
Park, J. S. , Froscher, J. N. , "A Strategy for information Survivability". In: 4th IEEE/CMU/SEI Information Survivability Workshop (ISW), Vancouver, Canada, (2002) 18-20.
-
(2002)
4th IEEE/CMU/SEI Information Survivability Workshop (ISW)
, pp. 18-20
-
-
Park, J.S.1
Froscher, J.N.2
-
4
-
-
36349021963
-
Security for sensor networks
-
Kluwer Academic
-
Avancha, S. , Undercoffer, J. L. , Joshi, A. , Pinkston, J. : "Security for Sensor Networks, " Wireless Sensor Networks, Kluwer Academic (2004) 253-27
-
(2004)
Wireless Sensor Networks
, pp. 253-327
-
-
Avancha, S.1
Undercoffer, J.L.2
Joshi, A.3
Pinkston, J.4
-
5
-
-
33847215147
-
How to secure a wireless sensor network
-
1595561, Proceedings of the 2005 Intelligent Sensors, Sensor Networks and Information Processing Conference
-
Law, Y. W. , Havinga, P. J. M, "How to Secure a Wireless Sensor Network, " In. Proc. of Int. Conf. on Intelligent Sensors, Sensor Networks and Information Processing, IEEE Computer society (2005) 89-95. (Pubitemid 46305560)
-
(2005)
Proceedings of the 2005 Intelligent Sensors, Sensor Networks and Information Processing Conference
, vol.2005
, pp. 88-95
-
-
Law, Y.W.1
Havinga, P.J.M.2
-
6
-
-
33845420465
-
Securing distributed wireless sensor networks: Issues and guidelines
-
DOI 10.1109/SUTC.2006.120, 1636278, Proceedings - Thirteenth International Symposium on Temporal Representation and Reasoning, TIME 2006
-
Shaikh, R. A. , Lee, S. , Song, Y. , Zhung Y, "Securing Distributed Wireless Sensor Networks:Issues and Guidelines. , In. Proc. of Int. Conf. on Sensor Networks, Ubiquitous, and Trustworthy Computing, IEEE computer society (2006) 226-231. (Pubitemid 44889174)
-
(2006)
Proceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
, vol.2006 I
, pp. 226-231
-
-
Shaikh, R.A.1
Sungyoung, L.2
Young, J.S.3
Yonil, Z.4
-
7
-
-
33751044459
-
A security framework for wireless sensor networks
-
1634235, Proceedings of the 2006 IEEE Sensors Applications Symposium
-
Zia, T. , Zomaya, A, "A Security Framework for Wireless Sensor Networks, "In. Sym. Sensor Applications, IEEE Computer Society (2006) 49-53. (Pubitemid 44754579)
-
(2006)
Proceedings of the 2006 IEEE Sensors Applications Symposium
, pp. 49-53
-
-
Zia, T.1
Zomaya, A.2
-
8
-
-
34548314598
-
Optimal jamming attacks and network defense policies in wireless sensor networks
-
DOI 10.1109/INFCOM.2007.155, 4215737, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
Mingyan Li,Iordanis Koutsopoulos, Radha Poovendran , "Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks, "In:IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2007 proceedings. (Pubitemid 47334355)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 1307-1315
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
9
-
-
33144475784
-
Ormhole attacks in wireless networks
-
Feb., FEBRUARY
-
Yih-Chun Hu, Adrian Perrig, avid B. Johnson, "ormhole Attacks in Wireless Networks, "In:I IEEE Journal on Selected Areas in Communications, Volume 24, Issue 2, Feb. 2006 Page(s):370 - 380, FEBRUARY 2006,
-
(2006)
I IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 370-380
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, A.B.3
-
10
-
-
33746301733
-
A localized, distributed protocol for secure information exchange in sensor networks
-
DOI 10.1109/IPDPS.2005.37, Proceedings - 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2005
-
Tassos Dimitriou and Ioannis Krontiris, "A Localized, Distributed Protocol for Secure Information Exchange in Sensor Networks, " Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) (Pubitemid 44101809)
-
(2005)
Proceedings - 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2005
, vol.2005
, pp. 1420167
-
-
Dimitriou, T.1
Krontiris, I.2
-
11
-
-
0028994247
-
Software rejuvenation: Analysis, module and applications
-
Pasadena, CA : IEEE Computer Society Pre
-
Huang Y, Kintala C, Kolettis N, et al. "Software Rejuvenation: Analysis, Module and applications, " [A]. Proceedings of the 25th symposium on Fault Tolerant Computer System , Pasadena, CA : IEEE Computer Society Pre(1995). 381-390.
-
(1995)
[A]. Proceedings of the 25th Symposium on Fault Tolerant Computer System
, pp. 381-390
-
-
Huang, Y.1
Kintala, C.2
Kolettis, N.3
-
12
-
-
33845591573
-
Performance assurance via software rejuvenation: Monitoring, statistics and algorithms
-
DOI 10.1109/DSN.2006.58, 1633532, Proceedings - DSN 2006: 2006 International Conference on Dependable Systems and Networks
-
Alberto Avritzer, Andre Bondi, Michael Grottke, Kishor S. Trivedi, and Elaine J. Weyuker, "Performance Assurance via Software Rejuvenation: Monitoring, Statistics and Algorithms", In Proc. IEEE International Conference on Dependable Systems and Networks 2006, (2006) 435-444. (Pubitemid 44930444)
-
(2006)
Proceedings of the International Conference on Dependable Systems and Networks
, vol.2006
, pp. 435-444
-
-
Avritzer, A.1
Bondi, A.2
Grottke, M.3
Trivedi, K.S.4
Weyuker, E.J.5
-
14
-
-
34047266625
-
Analysis of software aging in a Web server
-
DOI 10.1109/TR.2006.879609
-
Grottke, M. ; Li, L. ; Vaidyanathan, K. ; Trivedi, K. S. ; "Analysis of Software Aging in a Web Server, "IEEE TRANSACTIONS ON RELIABILITY, VOL.55, NO. 3, SEPTEMBER 2006. (Pubitemid 46547556)
-
(2006)
IEEE Transactions on Reliability
, vol.55
, Issue.3
, pp. 411-420
-
-
Grottke, M.1
Li, L.2
Vaidyanathan, K.3
Trivedi, K.S.4
-
15
-
-
34748879608
-
Deterministic models of software aging and optimal rejuvenation schedules
-
DOI 10.1109/INM.2007.374780, 4258532, 10th IFIP/IEEE International Symposium on Integrated Network Management 2007, IM '07
-
Andrzejak, Artur; Silva, Luis;"Deterministic Models of Software Aging and Optimal Rejuvenation Schedules, " 2007. IM '07. 10th IFIP/IEEE International Symposium on Integrated Network Management, (2007)159-168. (Pubitemid 47485169)
-
(2007)
10th IFIP/IEEE International Symposium on Integrated Network Management 2007, IM '07
, pp. 159-168
-
-
Andrzejak, A.1
Silva, L.2
-
17
-
-
33646421126
-
A survivability model for cluster system under DoS attacks
-
Khin Mi MI Aung , KiejinPark, Jong sou Park, "A survivability Model for Cluster system under DoS attacks, " In the HPCC 2005, LNCS 3726(2005)567-572.
-
(2005)
HPCC 2005, LNCS 3726
, pp. 567-572
-
-
Aung, K.M.M.1
KiejinPark2
Park, J.S.3
-
20
-
-
34247467024
-
Distributed software management in sensor networks using profiling techniques
-
First International Conference on Communication System Software and Middleware, Comsware 2006
-
G. Fuchs, S. Truchat, and F. Dressler, "DistributedSoftware Management in Sensor Networks using Profiling Techniques, " In Proc. of 1st Int. Workshop on Software for Sensor Networks, New Dehli, India, 2006. (Pubitemid 46664605)
-
(2006)
First International Conference on Communication System Software and Middleware, Comsware 2006
, vol.2006
, pp. 1665225
-
-
Fuchs, G.1
Truchat, S.2
Dressler, F.3
-
23
-
-
0035936112
-
The regeneration gap
-
22 November
-
Helen Pearson, The regeneration gap, NatureScience Update. 22 November 2001.
-
(2001)
NatureScience Update
-
-
Pearson, H.1
|