-
1
-
-
84886244808
-
-
"Openflow." [Online]. Available: http://www.openflow.org/wp/learnmore/
-
"Openflow." [Online]
-
-
-
4
-
-
84893525019
-
Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations
-
C.-J. Chung, J. Cui, P. Khatkar, and D. Huang, "Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations." ICST, 2013.
-
(2013)
ICST
-
-
Chung, C.-J.1
Cui, J.2
Khatkar, P.3
Huang, D.4
-
5
-
-
84897585209
-
NICE: Network intrusion detection and countermeasure selection in virtual network systems
-
C.-J. Chung, P. Khatkar, T. Xing, J. Lee, and D. Huang, "NICE: network intrusion detection and countermeasure selection in virtual network systems," IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 4, pp. 198-211, 2013.
-
(2013)
IEEE Transactions on Dependable and Secure Computing
, vol.10
, Issue.4
, pp. 198-211
-
-
Chung, C.-J.1
Khatkar, P.2
Xing, T.3
Lee, J.4
Huang, D.5
-
6
-
-
84957612962
-
Nice: Network intrusion detection and countermeasure selection in virtual network systems
-
pre-print
-
-, "Nice: Network intrusion detection and countermeasure selection in virtual network systems," IEEE Transactions on Dependable and Secure Computing (TDSC), Special Issue on Cloud computing Assessment: metrics, algorithms, policies, models, and evaluation techniques, pre-print, avaialble at http://dj.eas.asu.edu/snac/document/tdsc-vinice-v8.pdf, 2012.
-
(2012)
IEEE Transactions on Dependable and Secure Computing (TDSC), Special Issue on Cloud Computing Assessment: Metrics, Algorithms, Policies, Models, and Evaluation Techniques
-
-
Chung, C.-J.1
Khatkar, P.2
Xing, T.3
Lee, J.4
Huang, D.5
-
7
-
-
84866695287
-
Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees
-
Boston, MA, USA, June 25-28, 2012
-
A. Roy, D. S. Kim, and K. S. Trivedi, "Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees," in IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2012, Boston, MA, USA, June 25-28, 2012, 2012, pp. 1-12.
-
(2012)
IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2012
, pp. 1-12
-
-
Roy, A.1
Kim, D.S.2
Trivedi, K.S.3
-
8
-
-
84906976356
-
Scalable analytics for iaas cloud availability
-
R. Ghosh, F. Longo, F. Frattini, S. Russo, and K. S. Trivedi, "Scalable analytics for iaas cloud availability," IEEE T. Cloud Computing, vol. 2, no. 1, pp. 57-70, 2014.
-
(2014)
IEEE T. Cloud Computing
, vol.2
, Issue.1
, pp. 57-70
-
-
Ghosh, R.1
Longo, F.2
Frattini, F.3
Russo, S.4
Trivedi, K.S.5
-
9
-
-
85012186650
-
Finding hierarchical heavy hitters in data streams
-
Proceedings of the 29th International Conference on Very Large Data Bases - Volume 29, ser. Berlin, Germany: VLDB Endowment
-
G. Cormode, F. Korn, S. Muthukrishnan, and D. Srivastava, "Finding hierarchical heavy hitters in data streams," in Proceedings of the 29th International Conference on Very Large Data Bases - Volume 29, ser. VLDB '03. Berlin, Germany: VLDB Endowment, 2003, p. 464475.
-
(2003)
VLDB '03
-
-
Cormode, G.1
Korn, F.2
Muthukrishnan, S.3
Srivastava, D.4
-
10
-
-
84861919350
-
Detecting anomalies in backbone network traffic: A performance comparison among several change detection methods
-
Jan.
-
C. Callegari, S. Giordano, M. Pagano, and T. Pepe, "Detecting anomalies in backbone network traffic: a performance comparison among several change detection methods," International Journal of Sensor Networks, vol. 11, no. 4, pp. 205-214, Jan. 2012.
-
(2012)
International Journal of Sensor Networks
, vol.11
, Issue.4
, pp. 205-214
-
-
Callegari, C.1
Giordano, S.2
Pagano, M.3
Pepe, T.4
-
11
-
-
84875951216
-
A methodological overview on anomaly detection
-
Data Traffic Monitoring and Analysis, ser. E. Biersack, C. Callegari, and M. Matijasevic, Eds. Springer Berlin Heidelberg, Jan. [Online]
-
C. Callegari, A. Coluccia, A. DAlconzo, W. Ellens, S. Giordano, M. Mandjes, M. Pagano, T. Pepe, F. Ricciato, and P. Zuraniewski, "A methodological overview on anomaly detection," in Data Traffic Monitoring and Analysis, ser. Lecture Notes in Computer Science, E. Biersack, C. Callegari, and M. Matijasevic, Eds. Springer Berlin Heidelberg, Jan. 2013, no. 7754, pp. 148-183. [Online]. Available: http://link.springer.com.ezproxy1.lib.asu.edu/chapter/10.1007/978-3-642-36784-7-7
-
(2013)
Lecture Notes in Computer Science
, Issue.7754
, pp. 148-183
-
-
Callegari, C.1
Coluccia, A.2
DAlconzo, A.3
Ellens, W.4
Giordano, S.5
Mandjes, M.6
Pagano, M.7
Pepe, T.8
Ricciato, F.9
Zuraniewski, P.10
-
15
-
-
84937715103
-
Towards a theory of moving target defense
-
ACM
-
R. Zhuang, S. A. DeLoach, and X. Ou, "Towards a theory of moving target defense," in Proceedings of the First ACM Workshop on Moving Target Defense. ACM, 2014, pp. 31-40.
-
(2014)
Proceedings of the First ACM Workshop on Moving Target Defense
, pp. 31-40
-
-
Zhuang, R.1
DeLoach, S.A.2
Ou, X.3
-
16
-
-
84863913620
-
-
Springer
-
S. Jajodia, A. K. Ghosh, V. Subrahmanian, V. Swarup, C. Wang, and X. S. Wang, Moving Target Defense II. Springer, 2013.
-
(2013)
Moving Target Defense
, vol.2
-
-
Jajodia, S.1
Ghosh, A.K.2
Subrahmanian, V.3
Swarup, V.4
Wang, C.5
Wang, X.S.6
-
17
-
-
84937675431
-
Comparing different moving target defense techniques
-
ACM
-
J. Xu, P. Guo, M. Zhao, R. F. Erbacher, M. Zhu, and P. Liu, "Comparing different moving target defense techniques," in Proceedings of the First ACM Workshop on Moving Target Defense. ACM, 2014, pp. 97-107.
-
(2014)
Proceedings of the First ACM Workshop on Moving Target Defense
, pp. 97-107
-
-
Xu, J.1
Guo, P.2
Zhao, M.3
Erbacher, R.F.4
Zhu, M.5
Liu, P.6
-
18
-
-
84937692873
-
Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers
-
ACM
-
J. H. H. Jafarian, E. Al-Shaer, and Q. Duan, "Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers," in Proceedings of the First ACM Workshop on Moving Target Defense. ACM, 2014, pp. 69-78.
-
(2014)
Proceedings of the First ACM Workshop on Moving Target Defense
, pp. 69-78
-
-
Jafarian, J.H.H.1
Al-Shaer, E.2
Duan, Q.3
-
20
-
-
0023997325
-
Data diversity: An approach to software fault tolerance
-
P. E. Ammann and J. C. Knight, "Data diversity: An approach to software fault tolerance," Computers, IEEE Transactions on, vol. 37, no. 4, pp. 418-425, 1988.
-
(1988)
Computers, IEEE Transactions on
, vol.37
, Issue.4
, pp. 418-425
-
-
Ammann, P.E.1
Knight, J.C.2
-
21
-
-
84937676479
-
A game theoretic approach to strategy determination for dynamic platform defenses
-
ACM
-
K. M. Carter, J. F. Riordan, and H. Okhravi, "A game theoretic approach to strategy determination for dynamic platform defenses," in Proceedings of the First ACM Workshop on Moving Target Defense. ACM, 2014, pp. 21-30.
-
(2014)
Proceedings of the First ACM Workshop on Moving Target Defense
, pp. 21-30
-
-
Carter, K.M.1
Riordan, J.F.2
Okhravi, H.3
-
22
-
-
84937705020
-
On the challenges of effective movement
-
ACM
-
T. Hobson, H. Okhravi, D. Bigelow, R. Rudd, and W. Streilein, "On the challenges of effective movement," in Proceedings of the First ACM Workshop on Moving Target Defense. ACM, 2014, pp. 41-50.
-
(2014)
Proceedings of the First ACM Workshop on Moving Target Defense
, pp. 41-50
-
-
Hobson, T.1
Okhravi, H.2
Bigelow, D.3
Rudd, R.4
Streilein, W.5
-
23
-
-
79951760230
-
A novel design for future on-demand service and security
-
C. YuHunag, T. MinChi, C. YaoTing, C. YuChieh, and C. YanRen, "A novel design for future on-demand service and security," in 2010 12th IEEE International Conference on Communication Technology (ICCT), 2010, pp. 385-388.
-
(2010)
2010 12th IEEE International Conference on Communication Technology (ICCT)
, pp. 385-388
-
-
YuHunag, C.1
MinChi, T.2
YaoTing, C.3
YuChieh, C.4
YanRen, C.5
-
24
-
-
79955041204
-
Lightweight DDoS flooding attack detection using NOX/OpenFlow
-
Oct.
-
R. Braga, E. Mota, and A. Passito, "Lightweight DDoS flooding attack detection using NOX/OpenFlow," in 2010 IEEE 35th Conference on Local Computer Networks (LCN), Oct. 2010, pp. 408-415.
-
(2010)
2010 IEEE 35th Conference on Local Computer Networks (LCN)
, pp. 408-415
-
-
Braga, R.1
Mota, E.2
Passito, A.3
-
25
-
-
84055179019
-
Source address validation solution with OpenFlow/NOX architecture
-
Oct.
-
G. Yao, J. Bi, and P. Xiao, "Source address validation solution with OpenFlow/NOX architecture," in 2011 19th IEEE International Conference on Network Protocols (ICNP), Oct. 2011, pp. 7 -12.
-
(2011)
2011 19th IEEE International Conference on Network Protocols (ICNP)
, pp. 7-12
-
-
Yao, G.1
Bi, J.2
Xiao, P.3
-
26
-
-
84866521295
-
Openflow random host mutation: Transparent moving target defense using software defined networking
-
Proceedings of the first workshop on Hot topics in software defined networks, ser. New York, NY, USA: ACM
-
J. H. Jafarian, E. Al-Shaer, and Q. Duan, "Openflow random host mutation: transparent moving target defense using software defined networking," in Proceedings of the first workshop on Hot topics in software defined networks, ser. HotSDN '12. New York, NY, USA: ACM, 2012, pp. 127-132.
-
(2012)
HotSDN '12
, pp. 127-132
-
-
Jafarian, J.H.1
Al-Shaer, E.2
Duan, Q.3
-
27
-
-
84866485994
-
Splendid isolation: A slice abstraction for software-defined networks
-
Proceedings of the First Workshop on Hot Topics in Software Defined Networks, ser. New York, NY, USA: ACM
-
S. Gutz, A. Story, C. Schlesinger, and N. Foster, "Splendid isolation: A slice abstraction for software-defined networks," in Proceedings of the First Workshop on Hot Topics in Software Defined Networks, ser. HotSDN '12. New York, NY, USA: ACM, 2012, pp. 79-84.
-
(2012)
HotSDN '12
, pp. 79-84
-
-
Gutz, S.1
Story, A.2
Schlesinger, C.3
Foster, N.4
-
28
-
-
84938915521
-
Towards a practical survivable intrusion tolerant replication system
-
M. Platania, D. Obenshain, T. Tantillo, R. Sharma, and Y. Amir, "Towards a practical survivable intrusion tolerant replication system," in Proc. 33rd Symposium on Reliabbe and Distributed Systems, 2014, pp. 242-252.
-
(2014)
Proc. 33rd Symposium on Reliabbe and Distributed Systems
, pp. 242-252
-
-
Platania, M.1
Obenshain, D.2
Tantillo, T.3
Sharma, R.4
Amir, Y.5
-
29
-
-
79951618531
-
SecondNet: A data center network virtualization architecture with bandwidth guarantees
-
C. Guo, G. Lu, H. J. Wang, S. Yang, C. Kong, P. Sun, W. Wu, and Y. Zhang, "SecondNet: a data center network virtualization architecture with bandwidth guarantees," in Proceedings of ACM Co-NEXT'2010, Philadelphia, Pennsylvania, 2010, pp. 15:1-15:12.
-
(2010)
Proceedings of ACM Co-NEXT'2010, Philadelphia, Pennsylvania
, pp. 15:1-15:12
-
-
Guo, C.1
Lu, G.2
Wang, H.J.3
Yang, S.4
Kong, C.5
Sun, P.6
Wu, W.7
Zhang, Y.8
-
30
-
-
85015506899
-
Cloud security
-
(eds. N. Fonseca and R. Boutaba). IEEE and Wiley
-
T. Xing, Z. Xiong, D. Huang, and D. Medhi, "Cloud security," in Cloud Services, Networking and Management (eds. N. Fonseca and R. Boutaba). IEEE and Wiley, 2015.
-
(2015)
Cloud Services, Networking and Management
-
-
Xing, T.1
Xiong, Z.2
Huang, D.3
Medhi, D.4
-
32
-
-
84860544941
-
FireCol: A collaborative protection network for the detection of flooding DDoS attacks
-
J. Francois, I. Aib, and R. Boutaba, "FireCol: a collaborative protection network for the detection of flooding DDoS attacks," IEEE/ACM Transactions on Networking, vol. PP, no. 99, p. 1, 2012.
-
(2012)
IEEE/ACM Transactions on Networking
, vol.PP
, Issue.99
, pp. 1
-
-
Francois, J.1
Aib, I.2
Boutaba, R.3
-
33
-
-
84902552655
-
-
"OpenStack Heat," available at https://wiki.openstack.org/wiki/Heat.
-
OpenStack Heat
-
-
-
34
-
-
84957709299
-
-
"OpenStack MAAS/JuJu," available at https://maas.ubuntu.com/docs/juju-quick-start.html.
-
OpenStack MAAS/JuJu
-
-
-
35
-
-
84957621379
-
-
"Puppet Software," available at http://puppetlabs.com/.
-
Puppet Software
-
-
-
39
-
-
24944486135
-
Network security management using ARP spoofing
-
Computational Science and Its Applications - ICCSA 2004, ser. Springer Berlin / Heidelberg
-
K. Kwon, S. Ahn, and J. Chung, "Network security management using ARP spoofing," in Computational Science and Its Applications - ICCSA 2004, ser. Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2004, vol. 3043, pp. 142-149.
-
(2004)
Lecture Notes in Computer Science
, vol.3043
, pp. 142-149
-
-
Kwon, K.1
Ahn, S.2
Chung, J.3
-
40
-
-
33947495454
-
Fighting bugs: Remove, retry, replicate, and rejuvenate
-
Feb.
-
M. Grottke and K. S. Trivedi, "Fighting bugs: Remove, retry, replicate, and rejuvenate," Computer, vol. 40, no. 2, pp. 107-109, Feb. 2007.
-
(2007)
Computer
, vol.40
, Issue.2
, pp. 107-109
-
-
Grottke, M.1
Trivedi, K.S.2
-
41
-
-
24344433562
-
A comprehensive model for software rejuvenation
-
April
-
K. Vaidyanathan and K. Trivedi, "A comprehensive model for software rejuvenation," Dependable and Secure Computing, IEEE Transactions on, vol. 2, no. 2, pp. 124-137, April 2005.
-
(2005)
Dependable and Secure Computing, IEEE Transactions on
, vol.2
, Issue.2
, pp. 124-137
-
-
Vaidyanathan, K.1
Trivedi, K.2
-
42
-
-
84883657030
-
How does testing affect the availability of aging software systems?
-
M. Grottke and B. Schleich, "How does testing affect the availability of aging software systems?" Perform. Eval., vol. 70, no. 3, pp. 179-196, 2013.
-
(2013)
Perform. Eval.
, vol.70
, Issue.3
, pp. 179-196
-
-
Grottke, M.1
Schleich, B.2
-
43
-
-
84885152176
-
A comprehensive approach to optimal software rejuvenation
-
J. Zhao, Y. Wang, G. Ning, K. S. Trivedi, R. M. Jr., and K. Cai, "A comprehensive approach to optimal software rejuvenation," Perform. Eval., vol. 70, no. 11, pp. 917-933, 2013.
-
(2013)
Perform. Eval.
, vol.70
, Issue.11
, pp. 917-933
-
-
Zhao, J.1
Wang, Y.2
Ning, G.3
Trivedi, K.S.4
M, R.5
Cai, K.6
-
44
-
-
84892614032
-
Software rejuvenation scheduling using accelerated life testing
-
J. Zhao, Y. Jin, K. S. Trivedi, R. M. Jr., and Y. Wang, "Software rejuvenation scheduling using accelerated life testing," JETC, vol. 10, no. 1, p. 9, 2014.
-
(2014)
JETC
, vol.10
, Issue.1
, pp. 9
-
-
Zhao, J.1
Jin, Y.2
Trivedi, K.S.3
M, R.4
Wang, Y.5
-
45
-
-
84938920673
-
A systematic differential analysis for fast and robust detection of software aging
-
October
-
R. Matias, A. Andrzejak, F. Machida, D. Elias, and K. Trivedi, "A systematic differential analysis for fast and robust detection of software aging," in 33rd Int. Symp. on Reliable Distributed Systems, October 2014.
-
(2014)
33rd Int. Symp. on Reliable Distributed Systems
-
-
Matias, R.1
Andrzejak, A.2
Machida, F.3
Elias, D.4
Trivedi, K.5
-
46
-
-
84908894279
-
N-version architectural framework for application security automation (nvasa)
-
M. Malaika, S. Nair, and F. Coyle, "N-version architectural framework for application security automation (nvasa)," in CrossTalk, The Journal of Defense Software Engineering (DoD), 2014.
-
(2014)
CrossTalk, the Journal of Defense Software Engineering (DoD)
-
-
Malaika, M.1
Nair, S.2
Coyle, F.3
-
48
-
-
60349114044
-
Availability modeling of sip protocol on ibm©websphere©
-
Dec.
-
K. Trivedi, D. Wang, D. J. Hunt, A. Rindos, W. E. Smith, and B. Vashaw, "Availability modeling of sip protocol on ibm©websphere©," in Dependable Computing, 2008. PRDC '08. 14th IEEE Pacific Rim International Symposium on, Dec 2008, pp. 323-330.
-
(2008)
Dependable Computing, 2008. PRDC '08. 14th IEEE Pacific Rim International Symposium on
, pp. 323-330
-
-
Trivedi, K.1
Wang, D.2
Hunt, D.J.3
Rindos, A.4
Smith, W.E.5
Vashaw, B.6
-
49
-
-
84893243889
-
Fault triggers in open-source software: An experience report
-
Nov.
-
D. Cotroneo, M. Grottke, R. Natella, R. Pietrantuono, and K. Trivedi, "Fault triggers in open-source software: An experience report," in Software Reliability Engineering (ISSRE), 2013 IEEE 24th International Symposium on, Nov 2013, pp. 178-187.
-
(2013)
Software Reliability Engineering (ISSRE), 2013 IEEE 24th International Symposium on
, pp. 178-187
-
-
Cotroneo, D.1
Grottke, M.2
Natella, R.3
Pietrantuono, R.4
Trivedi, K.5
-
50
-
-
84863270092
-
Recovery from failures due to mandelbugs in it systems
-
vol. 0, Los Alamitos, CA, USA
-
K. Trivedi, R. Mansharamani, D. Kim, M. Grottke, and M. Nambiar, "Recovery from failures due to mandelbugs in it systems," in 2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing, vol. 0, Los Alamitos, CA, USA, 2011, pp. 224-233.
-
(2011)
2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing
, pp. 224-233
-
-
Trivedi, K.1
Mansharamani, R.2
Kim, D.3
Grottke, M.4
Nambiar, M.5
-
51
-
-
84928670777
-
Reproducibility of environment-dependent software failures: An experience report
-
D. Cavezza, R. Pietrantuono, J. Alonso, S. Russo, and K. Trivedi, "Reproducibility of environment-dependent software failures: an experience report," in Int. Symp. on Software Reliability Engineering, 2014, pp. 1-9.
-
(2014)
Int. Symp. on Software Reliability Engineering
, pp. 1-9
-
-
Cavezza, D.1
Pietrantuono, R.2
Alonso, J.3
Russo, S.4
Trivedi, K.5
-
52
-
-
84883656370
-
A comparative experimental study of software rejuvenation overhead
-
J. Alonso, M. Rivalino, E. Vicente, A. Maria, and K. Trivedi, "A comparative experimental study of software rejuvenation overhead," Perform. Eval., vol. 70, no. 3, pp. 231-250, 2013.
-
(2013)
Perform. Eval.
, vol.70
, Issue.3
, pp. 231-250
-
-
Alonso, J.1
Rivalino, M.2
Vicente, E.3
Maria, A.4
Trivedi, K.5
-
53
-
-
77956579342
-
An empirical investigation of fault types in space mission system software
-
June
-
M. Grottke, A. Nikora, and K. Trivedi, "An empirical investigation of fault types in space mission system software," in Dependable Systems and Networks (DSN), 2010 IEEE/IFIP International Conference on, June 2010, pp. 447-456.
-
(2010)
Dependable Systems and Networks (DSN), 2010 IEEE/IFIP International Conference on
, pp. 447-456
-
-
Grottke, M.1
Nikora, A.2
Trivedi, K.3
-
54
-
-
84876374343
-
The nature of the times to flight software failure during space missions
-
Nov.
-
J. Alonso, M. Grottke, A. Nikora, and K. Trivedi, "The nature of the times to flight software failure during space missions," in Software Reliability Engineering (ISSRE), 2012 IEEE 23rd International Symposium on, Nov 2012, pp. 331-340.
-
(2012)
Software Reliability Engineering (ISSRE), 2012 IEEE 23rd International Symposium On
, pp. 331-340
-
-
Alonso, J.1
Grottke, M.2
Nikora, A.3
Trivedi, K.4
-
57
-
-
84900451613
-
-
"Apache Spark," available at https://spark.apache.org/.
-
Apache Spark
-
-
|