메뉴 건너뛰기




Volumn , Issue , 2010, Pages 452-456

Improving complex distributed software system availability through information hiding

Author keywords

availability; complex distributed software system; message forwarding; traffic analysis

Indexed keywords

CRITICAL COMPONENT; DISTRIBUTED SOFTWARE SYSTEM; INFORMATION HIDING; INTENTIONAL ATTACKS; MESSAGE FORWARDING; RANDOM ATTACKS; SIMULATION RESULT; TRAFFIC ANALYSIS; TRAFFIC FLOW;

EID: 77954693847     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1774088.1774183     Document Type: Conference Paper
Times cited : (5)

References (22)
  • 1
    • 0034721164 scopus 로고    scopus 로고
    • Error and attack tolerance of complex networks
    • July
    • R. Albert, H. Jeong, and A.-L. Barabasi. Error and attack tolerance of complex networks. Nature, 406(6794):378-382, July 2000.
    • (2000) Nature , vol.406 , Issue.6794 , pp. 378-382
    • Albert, R.1    Jeong, H.2    Barabasi, A.-L.3
  • 3
    • 0025418952 scopus 로고
    • Dependability modeling and evaluation of software fault-tolerant systems
    • J. Arlat, K. Kanoun, and J.-C. Laprie. Dependability modeling and evaluation of software fault-tolerant systems. IEEE Trans. Comput., 39(4):504-513, 1990.
    • (1990) IEEE Trans. Comput. , vol.39 , Issue.4 , pp. 504-513
    • Arlat, J.1    Kanoun, K.2    Laprie, J.-C.3
  • 4
    • 0035896667 scopus 로고    scopus 로고
    • Breakdown of the internet under intentional attack
    • Apr
    • R. Cohen, K. Erez, D. Ben-Avraham, and S. Havlin. Breakdown of the internet under intentional attack. Phys. Rev. Lett., 86(16):3682-3685, Apr 2001.
    • (2001) Phys. Rev. Lett. , vol.86 , Issue.16 , pp. 3682-3685
    • Cohen, R.1    Erez, K.2    Ben-Avraham, D.3    Havlin, S.4
  • 5
    • 33747061192 scopus 로고
    • Fundamental differences in the reliability of n-modular redundancy and redundancy and n-version programming
    • D. E. Eckhardt and L. D. Lee. Fundamental differences in the reliability of n-modular redundancy and redundancy and n-version programming. J. Syst. Softw., 8(4):313-318, 1988.
    • (1988) J. Syst. Softw. , vol.8 , Issue.4 , pp. 313-318
    • Eckhardt, D.E.1    Lee, L.D.2
  • 6
    • 6444241717 scopus 로고    scopus 로고
    • Tolerance of scale-free networks: From friendly to intentional attack strategies
    • L. K. Gallos, P. Argyrakis, R. Cohen, and S. Havlin. Tolerance of scale-free networks: from friendly to intentional attack strategies. Physica A, 344:504-509, 2004.
    • (2004) Physica A , vol.344 , pp. 504-509
    • Gallos, L.K.1    Argyrakis, P.2    Cohen, R.3    Havlin, S.4
  • 9
    • 43249094557 scopus 로고    scopus 로고
    • Protection vs. redundancy in homogeneous parallel systems
    • K. Hausken and G. Levitin. Protection vs. redundancy in homogeneous parallel systems. In Reliability Engineering & System Safety, volume 93, pages 1444-1451, 2008.
    • (2008) Reliability Engineering & System Safety , vol.93 , pp. 1444-1451
    • Hausken, K.1    Levitin, G.2
  • 10
    • 54049120572 scopus 로고    scopus 로고
    • False targets vs. redundancy in homogeneous parallel systems
    • K. Hausken and G. Levitin. False targets vs. redundancy in homogeneous parallel systems. In Reliability Engineering & System Safety, volume 94, pages 588-595, 2009.
    • (2009) Reliability Engineering & System Safety , vol.94 , pp. 588-595
    • Hausken, K.1    Levitin, G.2
  • 13
    • 12344308304 scopus 로고    scopus 로고
    • Basic concepts and taxonomy of dependable and secure computing
    • J. C. Laprie and B. Randell. Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secur. Comput., 1(1):11-33, 2004.
    • (2004) IEEE Trans. Dependable Secur. Comput. , vol.1 , Issue.1 , pp. 11-33
    • Laprie, J.C.1    Randell, B.2
  • 14
    • 63149134856 scopus 로고    scopus 로고
    • Redundancy vs. protection vs. false targets for systems under attack
    • G. Levitin and K. Hausken. Redundancy vs. protection vs. false targets for systems under attack. In IEEE Transactions on Reliability, volume 58, pages 58-68, 2009.
    • (2009) IEEE Transactions on Reliability , vol.58 , pp. 58-68
    • Levitin, G.1    Hausken, K.2
  • 20
    • 50249101303 scopus 로고    scopus 로고
    • Vulnerability of complex networks under intentional attack with incomplete information
    • J. Wu, H. Deng, Y. Tan, and D. Zhu. Vulnerability of complex networks under intentional attack with incomplete information. In Journal of Physics A: Mathematical and Theoretical, volume 40, pages 2665-2671, 2007.
    • (2007) Journal of Physics A: Mathematical and Theoretical , vol.40 , pp. 2665-2671
    • Wu, J.1    Deng, H.2    Tan, Y.3    Zhu, D.4
  • 21
    • 50949103905 scopus 로고    scopus 로고
    • On intentional attacks and protections in complex communication networks
    • S. Xiao and G. Xiao. On intentional attacks and protections in complex communication networks. Global Telecommunications Conference, pages 1-5, 2006.
    • (2006) Global Telecommunications Conference , pp. 1-5
    • Xiao, S.1    Xiao, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.