Information Assurance : Dependability and Security in Networked Systems
暂无分享,去创建一个
Yi Qian | Prashant Krishnamurthy | James B. D. Joshi | David Tipper | D. Tipper | J. Joshi | P. Krishnamurthy | Yi Qian | David Clark
[1] Salvatore J. Stolfo,et al. Toward Cost-Sensitive Modeling for Intrusion Detection and Response , 2002, J. Comput. Secur..
[2] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[3] Svein J. Knapskog,et al. Using Stochastic Game Theory to Compute the Expected Behavior of Attackers , 2005 .
[4] Nick McKeown,et al. Algorithms for packet classification , 2001, IEEE Netw..
[5] Shoa-Kai Liu. Challenges of all-optical network evolution , 1998, Conference Proceedings. LEOS'98. 11th Annual Meeting. IEEE Lasers and Electro-Optics Society 1998 Annual Meeting (Cat. No.98CH36243).
[6] Jean Arlat,et al. Characterization of the impact of faulty drivers on the robustness of the Linux kernel , 2004, International Conference on Dependable Systems and Networks, 2004.
[7] Tomas Olovsson,et al. A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior , 1997, IEEE Trans. Software Eng..
[8] Biswanath Mukherjee,et al. IP resilience within an autonomous system: current approaches, challenges, and future directions , 2005, IEEE Communications Magazine.
[9] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[10] Barton P. Miller,et al. An empirical study of the robustness of MacOS applications using random testing , 2006, RT '06.
[11] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[12] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.
[13] Markus Straßer,et al. A fault-tolerant protocol for providing the exactly-once property of mobile agents , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).
[14] Hideo Fujiwara,et al. Logic Testing and Design for Testability , 1985 .
[15] Marian Marciniak. Optical transparency in next generation IP over all-optical networks , 2001, Proceedings of 2001 3rd International Conference on Transparent Optical Networks (IEEE Cat. No.01EX488).
[16] Yu Liu,et al. Spare Capacity Allocation in Two-Layer Networks , 2007, IEEE Journal on Selected Areas in Communications.
[17] Carsten Lund,et al. Flow sampling under hard resource constraints , 2004, SIGMETRICS '04/Performance '04.
[18] R. Antosik. Protection and restoration in optical networks , 2000, 2000 2nd International Conference on Transparent Optical Networks. Conference Proceedings (Cat. No.00EX408).
[19] Fred B. Schneider,et al. Implementing trustworthy services using replicated state machines , 2005, IEEE Security & Privacy Magazine.
[20] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[21] Wojciech Molisz. Survivability function - a measure of disaster-based routing performance , 2004, IEEE Journal on Selected Areas in Communications.
[22] Ming-Yang Kao,et al. Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[23] Yun Liu and Kishore S. Trivedi,et al. Survivability Quantification: The Analytical Modeling Approach , 2006 .
[24] Yan Chen,et al. Reversible sketches for efficient and accurate change detection over network data streams , 2004, IMC '04.
[25] Yee Wei Law,et al. A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks , 2003, PWC.
[26] Jeffrey M. Voas. Building software recovery assertions from a fault injection-based propagation analysis , 1997, Proceedings Twenty-First Annual International Computer Software and Applications Conference (COMPSAC'97).
[27] Sheng Ma,et al. Real-time problem determination in distributed systems using active probing , 2004, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507).
[28] Ian F. Akyildiz,et al. A survey on wireless mesh networks , 2005, IEEE Communications Magazine.
[29] Sushil Jajodia,et al. Minimum-cost network hardening using attack graphs , 2006, Comput. Commun..
[30] Indrajit Ray,et al. Using Attack Trees to Identify Malicious Attacks from Authorized Insiders , 2005, ESORICS.
[31] Alan T. Sherman,et al. Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..
[32] Paul Ammann,et al. Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[33] Frank Hill,et al. Wrapping windows NT software for robustness , 1999, Digest of Papers. Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing (Cat. No.99CB36352).
[34] Roger M. Kieckhafer,et al. Exploiting Omissive Faults in Synchronous Approximate Agreement , 2000, IEEE Trans. Computers.
[35] J. M. Akinpelu,et al. The overload performance of engineered networks with nonhierarchical and hierarchical routing , 1984, AT&T Bell Laboratories Technical Journal.
[36] K. Kyamakya,et al. Security and survivability of distributed systems: an overview , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).
[37] Peng Ning,et al. Integrating IDS Alert Correlation and OS-Level Dependency Tracking , 2006, ISI.
[38] Glenford J. Myers,et al. Art of Software Testing , 1979 .
[39] Sheldon M. Ross. Introduction to Probability Models. , 1995 .
[40] Jean Arlat,et al. Benchmarking the dependability of Windows NT4, 2000 and XP , 2004, International Conference on Dependable Systems and Networks, 2004.
[41] Wenke Lee,et al. Discovering Novel Attack Strategies from INFOSEC Alerts , 2004, ESORICS.
[42] Marco Ajmone Marsan,et al. Modelling with Generalized Stochastic Petri Nets , 1995, PERV.
[43] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[44] B. Dutertre,et al. Intrusion tolerant software architectures , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[45] Neeraj Suri,et al. Error propagation profiling of operating systems , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[46] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[47] Yi-Bing Lin. Failure restoration of mobility databases for personal communication networks , 1995, Wirel. Networks.
[48] Peter Brucker,et al. Scheduling Algorithms , 1995 .
[49] Wayne D. Grover,et al. Cycle-oriented distributed preconfiguration: ring-like speed with mesh-like capacity for self-planning network restoration , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).
[50] Jean Arlat,et al. Dependability of COTS Microkernel-Based Systems , 2002, IEEE Trans. Computers.
[51] Paola Velardi,et al. Hardware-Related Software Errors: Measurement and Analysis , 1985, IEEE Transactions on Software Engineering.
[52] Robert K. Cunningham,et al. Fusing A Heterogeneous Alert Stream Into Scenarios , 2002, Applications of Data Mining in Computer Security.
[53] Jiankun Hu,et al. An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).
[54] William H. Sanders,et al. Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.
[55] Ravindra K. Ahuja,et al. Network Flows: Theory, Algorithms, and Applications , 1993 .
[56] Matti A. Hiltunen,et al. Building Survivable Services Using Redundancy and Adaptation , 2003, IEEE Trans. Computers.
[57] Ravishankar K. Iyer,et al. Faults, symptoms, and software fault tolerance in the Tandem GUARDIAN90 operating system , 1993, FTCS-23 The Twenty-Third International Symposium on Fault-Tolerant Computing.
[58] Carl E. Landwehr,et al. A taxonomy of computer program security flaws , 1993, CSUR.
[59] Deep Medhi,et al. A key-chain-based keying scheme for many-to-many secure group communication , 2004, TSEC.
[60] Djamel Djenouri,et al. A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.
[61] Daniel P. Siewiorek,et al. Development of a benchmark to measure system robustness , 1993, FTCS-23 The Twenty-Third International Symposium on Fault-Tolerant Computing.
[62] Deep Medhi,et al. A unified approach to network survivability for teletraffic networks: models, algorithms and analysis , 1994, IEEE Trans. Commun..
[63] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[64] S. Jafar,et al. Certification of large distributed computations with task dependencies in hostile environments , 2005, 2005 IEEE International Conference on Electro Information Technology.
[65] Kishor S. Trivedi,et al. Security analysis of SITAR intrusion tolerance system , 2003, SSRS '03.
[66] Dijiang Huang,et al. On providing confidentiality in link state routing protocol , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[67] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[68] Marc J. Schniederjans,et al. New architecture for intra-domain network security issues , 2006, CACM.
[69] Elisa Bertino,et al. XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! , 2006, SACMAT '06.
[70] Deep Medhi,et al. On providing survivable QoS services in the next generation Internet , 1999, MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341).
[71] Eugene H. Spafford,et al. The COPS Security Checker System , 1990, USENIX Summer.
[72] Daniel P. Siewiorek,et al. Comparing operating systems using robustness benchmarks , 1997, Proceedings of SRDS'97: 16th IEEE Symposium on Reliable Distributed Systems.
[73] Udo W. Pooch,et al. Adaptation techniques for intrusion detection and intrusion response systems , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[74] Giovanni Vigna,et al. NetSTAT: A Network-based Intrusion Detection System , 1999, J. Comput. Secur..
[75] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[76] Jean Arlat,et al. Impact of Internal and External Software Faults on the Linux Kernel , 2003 .
[77] Wayne D. Grover,et al. Advances in optical network design with p-cycles: joint optimization and pre-selection of candidate p-cycles , 2002, IEEE/LEOS Summer Topi All-Optical Networking: Existing and Emerging Architecture and Applications/Dynamic Enablers of Next-Generation Optical Communications Systems/Fast Optical Processing in Optical.
[78] Vishwani D. Agrawal,et al. Unified Methods for VLSI Simulation and Test Generation , 1989 .
[79] Yan Gao,et al. A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[80] C.G. Gruber,et al. A computational study for demand-wise shared protection , 2005, DRCN 2005). Proceedings.5th International Workshop on Design of Reliable Communication Networks, 2005..
[81] Gabriel Junyent,et al. Optical monitoring system for scalable all-optical networks , 1997, Conference Proceedings. LEOS '97. 10th Annual Meeting IEEE Lasers and Electro-Optics Society 1997 Annual Meeting.
[82] Yakov Rekhter,et al. BGP/MPLS IP Virtual Private Networks (VPNs) , 2006, RFC.
[83] David Tipper,et al. PCS network survivability , 1999, WCNC. 1999 IEEE Wireless Communications and Networking Conference (Cat. No.99TH8466).
[84] Gregory L. Frazier,et al. Autonomic defense: Thwarting automated attacks via real-time feedback control , 2003, Complex..
[85] Cem Kaner,et al. Testing Computer Software, Second Edition , 1993 .
[86] John Moy,et al. OSPF Version 2 , 1998, RFC.
[87] Wenke Lee,et al. Statistical Causality Analysis of INFOSEC Alert Data , 2003, RAID.
[88] Y. C. Yeh,et al. Triple-triple redundant 777 primary flight computer , 1996, 1996 IEEE Aerospace Applications Conference. Proceedings.
[89] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[90] George Varghese,et al. On Scalable Attack Detection in the Network , 2004, IEEE/ACM Transactions on Networking.
[91] Peter Adams,et al. Next-Generation Network , 2022 .
[92] Wei Xin,et al. The MONET project-a final report , 2000, Journal of Lightwave Technology.
[93] I. Stojmenovic,et al. Mobile Ad Hoc Networking with a View of 4G Wireless: Imperatives and Challenges , 2004 .
[94] Axel W. Krings,et al. Agent survivability: an application for strong and weak chain constrained scheduling , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[95] Neeraj Suri,et al. On the Selection of Error Model(s) for OS Robustness Evaluation , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[96] Malcolm I. Heywood,et al. Training genetic programming on half a million patterns: an example from anomaly detection , 2005, IEEE Transactions on Evolutionary Computation.
[97] Joe Marshall,et al. Measuring robustness of a fault tolerant aerospace system , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing. Digest of Papers.
[98] Suresh Subramaniam,et al. Survivability in optical networks , 2000, IEEE Netw..
[99] Jeannette M. Wing,et al. Game strategies in network security , 2005, International Journal of Information Security.
[100] Giovanni Vigna,et al. STATL: An Attack Language for State-Based Intrusion Detection , 2002, J. Comput. Secur..
[101] J. H. Lala. Intrusion tolerant systems , 2000, Proceedings. 2000 Pacific Rim International Symposium on Dependable Computing.
[102] Sharath Pankanti,et al. Filterbank-based fingerprint matching , 2000, IEEE Trans. Image Process..
[103] Jeffrey M. Voas,et al. Certifying Off-the-Shelf Software Components , 1998, Computer.
[104] Basil S. Maglaris,et al. Distributed Management Architecture for Cooperative Detection and Reaction to DDoS Attacks , 2004, Journal of Network and Systems Management.
[105] Axel W. Krings,et al. The test vector problem and limitations to evolving digital circuits , 2000, Proceedings. The Second NASA/DoD Workshop on Evolvable Hardware.
[106] Daniel P. Newman,et al. Penetration Testing and Cisco Network Defense , 2005 .
[107] Brian Randell,et al. Fundamental Concepts of Dependability , 2000 .
[108] David Tipper,et al. Risk reduction based survivable WDM network design , 2006, 2006 IEEE International Performance Computing and Communications Conference.
[109] Laura Painton Swiler,et al. A graph-based network-vulnerability analysis system , 1997, S&P 1998.
[110] Sushil Jajodia,et al. An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts , 2005, ESORICS.
[111] Barton P. Miller,et al. An empirical study of the robustness of Windows NT applications using random testing , 2000 .
[112] Morrie Gasser,et al. The Digital Distributed System Security Architecture , 1989 .
[113] J. Fee. All-optical network technology enablers , 1997, Proceedings of Optical Fiber Communication Conference (.
[114] J-C. Laprie,et al. DEPENDABLE COMPUTING AND FAULT TOLERANCE : CONCEPTS AND TERMINOLOGY , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'..
[115] W. J. Blackert,et al. Analyzing interaction between distributed denial of service attacks and mitigation technologies , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[116] Yves Crouzet,et al. Benchmarking the dependability of Windows and Linux using PostMark/spl trade/ workloads , 2005, 16th IEEE International Symposium on Software Reliability Engineering (ISSRE'05).
[117] Phillip A. Laplante,et al. Dictionary of Computer Science, Engineering, and Technology , 2000 .
[118] Jiankun Hu,et al. Enhanced gradient-based algorithm for the estimation of fingerprint orientation fields , 2007, Appl. Math. Comput..
[119] Kishor S. Trivedi,et al. Survivability analysis of telephone access network , 2004, 15th International Symposium on Software Reliability Engineering.
[120] Georg Stellner,et al. CoCheck: checkpointing and process migration for MPI , 1996, Proceedings of International Conference on Parallel Processing.
[121] Edmundo de Souza e Silva,et al. Performability Analysis of Computer Systems: From Model Spacification to Solution , 1992, Perform. Evaluation.
[122] Eugene H. Spafford,et al. ADEPTS: adaptive intrusion response using attack graphs in an e-commerce environment , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[123] Malgorzata Steinder,et al. Probabilistic fault diagnosis in communication systems through incremental hypothesis updating , 2004, Comput. Networks.
[124] Kevin J. Sullivan,et al. Towards a rigorous definition of information system survivability , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[125] Rodolphe Ortalo,et al. Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..
[126] Daniel P. Siewiorek,et al. Measuring Software Dependability by Robustness Benchmarking , 1997, IEEE Trans. Software Eng..
[127] Fred B. Schneider,et al. NAP: practical fault-tolerance for itinerant computations , 1999, Proceedings. 19th IEEE International Conference on Distributed Computing Systems (Cat. No.99CB37003).
[128] Dijiang Huang,et al. Network protection design for MPLS networks , 2005, DRCN 2005). Proceedings.5th International Workshop on Design of Reliable Communication Networks, 2005..
[129] Louis Anthony Cox,et al. Designing Least-Cost Survivable Wireless Backhaul Networks , 2000, J. Heuristics.
[130] Morton E. O'Kelly,et al. A geographic perspective on commercial Internet survivability , 2003, Telematics Informatics.
[131] Anup K. Ghosh,et al. Testing the robustness of Windows NT software , 1998, Proceedings Ninth International Symposium on Software Reliability Engineering (Cat. No.98TB100257).
[132] C. R. Ramakrishnan,et al. Model-Based Analysis of Configuration Vulnerabilities , 2002, J. Comput. Secur..
[133] Udo W. Pooch,et al. Cooperating security managers: a peer-based intrusion detection system , 1996, IEEE Netw..
[134] Hermann Kopetz,et al. Dependability: Basic Concepts and Terminology , 1992 .
[135] Davide Grillo. Personal communications and traffic engineering in ITU-T: the developing E.750-series of recommendations , 1996, IEEE Wirel. Commun..
[136] Luis F. G. Sarmenta. Sabotage-tolerance mechanisms for volunteer computing systems , 2002, Future Gener. Comput. Syst..
[137] Hari Balakrishnan,et al. Fast portscan detection using sequential hypothesis testing , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[138] Randal E. Bryant,et al. Graph-Based Algorithms for Boolean Function Manipulation , 1986, IEEE Transactions on Computers.
[139] Ravishankar K. Iyer,et al. Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors , 2002 .
[140] Ravishankar K. Iyer,et al. Characterization of linux kernel behavior under errors , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[141] David Tipper,et al. Prioritized traffic restoration in connection oriented QoS based networks , 2003, Comput. Commun..
[142] Wayne D. Grover,et al. New options and insights for survivable transport networks , 2002, IEEE Commun. Mag..
[143] Wayne D. Grover,et al. Hamiltonian p-cycles for fiber-level protection in semi-homogeneous homogeneous and optical networks , 2004, IEEE Network.
[144] Ramesh Bhandari. Survivable Networks: Algorithms for Diverse Routing , 1998 .
[145] Algirdas Avizienis,et al. The N-Version Approach to Fault-Tolerant Software , 1985, IEEE Transactions on Software Engineering.
[146] Eugene H. Spafford,et al. Automated adaptive intrusion containment in systems of interacting services , 2007, Comput. Networks.
[147] Jeannette M. Wing,et al. Scenario graphs and attack graphs , 2004 .
[148] Stuart Staniford-Chen,et al. Practical Automated Detection of Stealthy Portscans , 2002, J. Comput. Secur..
[149] Elisa Bertino,et al. Achieving privacy in trust negotiations with an ontology-based approach , 2006, IEEE Transactions on Dependable and Secure Computing.
[150] Sandeep Sharma,et al. An analysis of the congestion effects of link failures in wide area networks , 1994, IEEE J. Sel. Areas Commun..
[151] S. Jafar,et al. Theft-induced checkpointing for reconfigurable dataflow applications , 2005, 2005 IEEE International Conference on Electro Information Technology.
[152] Haiyun Luo,et al. UCAN: a unified cellular and ad-hoc network architecture , 2003, MobiCom '03.
[153] Dhiraj K. Pradhan,et al. Consensus With Dual Failure Modes , 1991, IEEE Trans. Parallel Distributed Syst..
[154] Sushil Jajodia,et al. Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts , 2006, Comput. Commun..
[155] Izhak Rubin,et al. Failure protection methods for optical meshed-ring communications networks , 2000, IEEE Journal on Selected Areas in Communications.
[156] Neeraj Suri,et al. EPIC: profiling the propagation and effect of data errors in software , 2004, IEEE Transactions on Computers.
[157] Amitava Dutta,et al. Design of partially survivable networks for cellular telecommunication systems , 1999, Eur. J. Oper. Res..
[158] Steven J. Templeton,et al. A requires/provides model for computer attacks , 2001, NSPW '00.
[159] Wayne D. Grover,et al. Mesh-based Survivable Transport Networks: Options and Strategies for Optical, MPLS, SONET and ATM Networking , 2003 .
[160] Navjot Singh,et al. Reliability testing of applications on Windows NT , 2000, Proceeding International Conference on Dependable Systems and Networks. DSN 2000.
[161] L. Shapley,et al. Stochastic Games* , 1953, Proceedings of the National Academy of Sciences.
[162] Lee Badger,et al. Security agility in response to intrusion detection , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[163] Deep Medhi,et al. A double authentication scheme to detect impersonation attack in link state routing protocols , 2003, IEEE International Conference on Communications, 2003. ICC '03..
[164] Jerome H. Saltzer,et al. End-to-end arguments in system design , 1984, TOCS.
[165] Jiankun Hu,et al. A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[166] R. C. Alferness. The all-optical networks , 2000, WCC 2000 - ICCT 2000. 2000 International Conference on Communication Technology Proceedings (Cat. No.00EX420).
[167] Franck Cappello,et al. Coordinated checkpoint versus message log for fault tolerant MPI , 2004, 2003 Proceedings IEEE International Conference on Cluster Computing.
[168] Vern Paxson,et al. Proceedings of the 13th USENIX Security Symposium , 2022 .
[169] Christopher Krügel,et al. Comprehensive approach to intrusion detection alert correlation , 2004, IEEE Transactions on Dependable and Secure Computing.
[170] Pierre Wolper,et al. Simple on-the-fly automatic verification of linear temporal logic , 1995, PSTV.
[171] Ravishankar K. Iyer,et al. An experimental evaluation of the REE SIFT environment for spaceborne applications , 2002, Proceedings International Conference on Dependable Systems and Networks.
[172] K. Steiglitz,et al. The Design of Minimum-Cost Survivable Networks , 1969 .
[173] William A. Arbaugh,et al. Real 802.11 Security: Wi-Fi Protected Access and 802.11i , 2003 .
[174] Jan Camenisch,et al. Design and implementation of the idemix anonymous credential system , 2002, CCS '02.
[175] Elisa Bertino,et al. Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[176] Christian Cachin,et al. Distributing trust on the Internet , 2001, 2001 International Conference on Dependable Systems and Networks.
[177] William H. Sanders,et al. Probabilistic validation of an intrusion-tolerant replication system , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[178] Jean Arlat,et al. Building dependable COTS microkernel-based systems using MAFALDA , 2000, Proceedings. 2000 Pacific Rim International Symposium on Dependable Computing.
[179] William A. Arbaugh,et al. Improving the latency of 802.11 hand-offs using neighbor graphs , 2004, MobiSys '04.
[180] Peng Ning,et al. Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.
[181] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[182] Kumar N. Sivarajan,et al. Optical Networks: A Practical Perspective , 1998 .
[183] Ravishankar K. Iyer,et al. An approach towards benchmarking of fault-tolerant commercial systems , 1996, Proceedings of Annual Symposium on Fault Tolerant Computing.
[184] Philip Koopman,et al. Comparing the robustness of POSIX operating systems , 1999, Digest of Papers. Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing (Cat. No.99CB36352).
[185] Dan Schnackenberg,et al. Infrastructure for intrusion detection and response , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[186] Brett Wilson,et al. Autonomic Response to Distributed Denial of Service Attacks , 2001, Recent Advances in Intrusion Detection.
[187] Jacek Blazewicz,et al. Scheduling Multiprocessor Tasks on Three Dedicated Processors , 1992, Inf. Process. Lett..
[188] G. Buja,et al. Conceptual frameworks for dependability and safety of a system , 2006, International Symposium on Power Electronics, Electrical Drives, Automation and Motion, 2006. SPEEDAM 2006..
[189] Jian Wang,et al. A Novel Quantitative Analysis Method for Network Survivability , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).
[190] Deep Medhi,et al. Network routing - algorithms, protocols, and architectures , 2007 .
[191] Svein J. Knapskog,et al. Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems , 2005, CIS.
[192] Malgorzata Steinder,et al. Yemanja—A Layered Fault Localization System for Multi-Domain Computing Utilities , 2002, Journal of Network and Systems Management.
[193] Jacob A. Abraham,et al. FERRARI: A Flexible Software-Based Fault and Error Injection System , 1995, IEEE Trans. Computers.
[194] P. E. Wirth,et al. Teletraffic implications of database architectures in mobile and personal communications , 1995, IEEE Commun. Mag..
[195] David Levin,et al. Survivable mobile wireless networks: issues, challenges, and research directions , 2002, WiSE '02.
[196] Cynthia A. Phillips,et al. Computer-attack graph generation tool , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[197] Özalp Babaoglu,et al. Streets of Byzantium: Network Architectures for Fast Reliable Broadcasts , 1985, IEEE Transactions on Software Engineering.
[198] O. Patrick Kreidl,et al. Feedback control applied to survivability: a host-based autonomic defense system , 2004, IEEE Transactions on Reliability.
[199] Raphael R. Some,et al. Experimental evaluation of a COTS system for space applications , 2002, Proceedings International Conference on Dependable Systems and Networks.
[200] Richard Bejtlich,et al. The Tao of Network Security Monitoring: Beyond Intrusion Detection , 2004 .
[201] Xinming Ou,et al. A scalable approach to attack graph generation , 2006, CCS '06.
[202] Xinghuo Yu,et al. A Biometric Encryption Approach Incorporating Fingerprint Indexing in Key Generation , 2006, ICIC.
[203] Judith N. Froscher,et al. Merging paradigms of survivability and security: stochastic faults and designed faults , 2003, NSPW '03.
[204] Somesh Jha,et al. Survivability analysis of network specifications , 2000, Proceeding International Conference on Dependable Systems and Networks. DSN 2000.
[205] Elisa Bertino,et al. Trust-/spl Xscr/;: a peer-to-peer framework for trust establishment , 2004, IEEE Transactions on Knowledge and Data Engineering.
[206] Elisa Bertino,et al. X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control , 2005, TSEC.
[207] Miron Livny,et al. Checkpoint and Migration of UNIX Processes in the Condor Distributed Processing System , 1997 .
[208] Arun K. Somani. Sequential Fault Occurrence and Reconfiguration in System Level Diagnosis , 1990, IEEE Trans. Computers.
[209] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[210] Nancy R. Mead,et al. Survivable Network Systems: An Emerging Discipline , 1997 .
[211] Prashant Krishnamurthy,et al. The interaction of security and survivability in hybrid wireless networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[212] Peng Ning,et al. Alert correlation through triggering events and common resources , 2004, 20th Annual Computer Security Applications Conference.
[213] Svein J. Knapskog,et al. Towards a stochastic model for integrated security and dependability evaluation , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[214] Diamantino Costa,et al. Fault injection spot-checks computer system dependability , 1999 .
[215] Henrique Madeira,et al. Xception: A Technique for the Experimental Evaluation of Dependability in Modern Computers , 1998, IEEE Trans. Software Eng..
[216] Somesh Jha,et al. Survivability analysis of networked systems , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.
[217] Apostolis K. Salkintzis,et al. WLAN-GPRS integration for next-generation mobile data networks , 2002, IEEE Wirel. Commun..
[218] Stefan Savage,et al. The Spread of the Sapphire/Slammer Worm , 2003 .
[219] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[220] Gangxiang Shen,et al. Design of Survivable Networks Based on p-Cycles , 2006, Handbook of Optimization in Telecommunications.
[221] Eugene L. Lawler,et al. Sequencing and scheduling: algorithms and complexity , 1989 .
[222] Henrique Madeira,et al. Multidimensional Characterization of the Impact of Faulty Drivers on the Operating Systems Behavior , 2003 .
[223] Jean Arlat,et al. Analysis of the effects of real and injected software faults: Linux as a case study , 2002, 2002 Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings..
[224] David K. Y. Yau,et al. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles , 2005, IEEE/ACM Transactions on Networking.
[225] Sushil Jajodia,et al. Efficient minimum-cost network hardening via exploit dependency graphs , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[226] Peng Liu,et al. Incentive-based modeling and inference of attacker intent, objectives, and strategies , 2003, CCS '03.
[227] Philip M. Thambidurai,et al. Interactive consistency with multiple failure modes , 1988, Proceedings [1988] Seventh Symposium on Reliable Distributed Systems.
[228] Kishor S. Trivedi,et al. Network survivability performance evaluation:: a quantitative approach with applications in wireless ad-hoc networks , 2002, MSWiM '02.
[229] Archana Ganapathi,et al. Windows XP Kernel Crash Analysis , 2006, LISA.
[230] Ehab Al-Shaer,et al. QoS Path Monitoring for Multicast Networks , 2002, Journal of Network and Systems Management.
[231] Salvatore J. Stolfo,et al. A coding approach to event correlation , 1995, Integrated Network Management.
[232] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[233] Alan D. Ross,et al. Network Security Essentials , 2003 .
[234] L.M. Rossey,et al. SARA: Survivable Autonomic Response Architecture , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[235] Deep Medhi,et al. Multi-layered network survivability-models, analysis, architecture, framework and implementation: an overview , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[236] Charles A. Holt,et al. The Nash equilibrium: A perspective , 2004, Proceedings of the National Academy of Sciences of the United States of America.
[237] Nancy G. Leveson,et al. An experimental evaluation of the assumption of independence in multiversion programming , 1986, IEEE Transactions on Software Engineering.
[238] Muriel Medard,et al. Security issues in all-optical networks , 1997 .
[239] L. Alvisi,et al. A Survey of Rollback-Recovery Protocols , 2002 .
[240] Karl N. Levitt,et al. NetKuang - A Multi-Host Configuration Vulnerability Checker , 1996, USENIX Security Symposium.
[241] Elisa Bertino,et al. GEO-RBAC: a spatially aware RBAC , 2005, SACMAT '05.
[242] William L. Fithen,et al. State of the Practice of Intrusion Detection Technologies , 2000 .
[243] Graham Cormode,et al. What's new: finding significant differences in network data streams , 2004, INFOCOM 2004.
[244] Grzegorz Malewicz,et al. Internet Computing of Tasks with Dependencies Using Unreliable Workers , 2004, OPODIS.
[245] Robert K. Cunningham,et al. Building Scenarios from a Heterogeneous Alert Stream , 2001 .
[246] Brian N. Bershad,et al. Improving the reliability of commodity operating systems , 2005, TOCS.
[247] Anupam Joshi,et al. Security for wireless sensor networks , 2004 .
[248] Karl N. Levitt,et al. Using Specification-Based Intrusion Detection for Automated Response , 2003, RAID.
[249] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[250] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[251] Ravishankar K. Iyer,et al. Error sensitivity of the Linux kernel executing on PowerPC G4 and Pentium 4 processors , 2004, International Conference on Dependable Systems and Networks, 2004.
[252] Fred B. Schneider,et al. Byzantine generals in action: implementing fail-stop processors , 1984, TOCS.
[253] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[254] Marco Listanti,et al. Strategy for protection and restoration of optical paths in WDM backbone networks for next-generation Internet infrastructures , 2002 .
[255] Gregory L. Frazier,et al. A controller-based autonomic defense system , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[256] Muriel Médard,et al. Distributed Algorithms for Attack Localization in All-Optical Networks , 1998, NDSS.
[257] John A. Buzacott. Markov Approach to Finding Failure Times of Repairable Systems , 1970 .
[258] Hung Q. Ngo,et al. Towards a theory of insider threat assessment , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[259] Volker Strumpen,et al. Portable and fault-tolerant software systems , 1998, IEEE Micro.
[260] Chung-Sheng Li,et al. Fault detection, isolation, and open fiber control in transparent all-optical networks , 1996, Proceedings of GLOBECOM'96. 1996 IEEE Global Telecommunications Conference.
[261] Rajiv Ramaswami,et al. Automatic fault detection, isolation, and recovery in transparent all-optical networks , 1997 .
[262] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[263] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[264] Xinghuo Yu,et al. A Novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based Banking Applications , 2006, ICB.
[265] G. Jakobson,et al. Alarm correlation , 1993, IEEE Network.
[266] Vinod Yegneswaran,et al. Internet intrusions: global characteristics and prevalence , 2003, SIGMETRICS '03.
[267] Sriram K. Rajamani,et al. The SLAM project: debugging system software via static analysis , 2002, POPL '02.
[268] Balachander Krishnamurthy,et al. Sketch-based change detection: methods, evaluation, and applications , 2003, IMC '03.
[269] Kishor S. Trivedi. Probability and Statistics with Reliability, Queuing, and Computer Science Applications , 1984 .
[270] Frédéric Cuppens,et al. LAMBDA: A Language to Model a Database for Detection of Attacks , 2000, Recent Advances in Intrusion Detection.
[271] Kang G. Shin,et al. Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[272] Giorgio Ausiello,et al. Structure Preserving Reductions among Convex Optimization Problems , 1980, J. Comput. Syst. Sci..
[273] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[274] H. A. Malec,et al. Communications reliability: a historical perspective , 1998 .
[275] Chen-Nee Chuah,et al. Analysis of link failures in an IP backbone , 2002, IMW '02.
[276] Peter G. Neumann,et al. Practical Architectures for Survivable Systems and Networks: Phase-One Final Report , 1999 .
[277] Michael R. Lyu,et al. Achieving software quality with testing coverage measures , 1994, Computer.
[278] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[279] Jin Cao,et al. Heuristic of differentiated path-shared protection for dual failures in restorable optical networks , 2007 .
[280] Frank Harary,et al. Graph Theory , 2016 .
[281] Abhishek Kumar,et al. Joint data streaming and sampling techniques for detection of super sources and destinations , 2005, IMC '05.
[282] Jacek Blazewicz,et al. Scheduling multiprocessor tasks of three dedicated processors information processing letters 41 (5) (1992) 275–280 , 1994 .
[283] Frédéric Cuppens,et al. Managing alerts in a multi-intrusion detection environment , 2001, Seventeenth Annual Computer Security Applications Conference.
[284] Michael R. Lyu. Software Fault Tolerance , 1995 .
[285] Clifford Stein,et al. Introduction to Algorithms, 2nd edition. , 2001 .
[286] David L. Black,et al. An Architecture for Differentiated Service , 1998 .
[287] M. Herzberg,et al. The hop-limit approach for spare-capacity assignment in survivable networks , 1995, TNET.
[288] Gerard J. Holzmann,et al. The SPIN Model Checker - primer and reference manual , 2003 .
[289] Zhen Xiao,et al. An automated approach to increasing the robustness of C libraries , 2002, Proceedings International Conference on Dependable Systems and Networks.
[290] James P. Anderson,et al. Information Security in a Multi-User Computer Environment , 1972, Adv. Comput..
[291] Kishor S. Trivedi,et al. Composite performance and availability analysis of wireless communication networks , 2001, IEEE Trans. Veh. Technol..
[292] Boudewijn R. Haverkort,et al. Model checking for survivability! , 2005, Second International Conference on the Quantitative Evaluation of Systems (QEST'05).
[293] Cécile Germain,et al. Result checking in global computing systems , 2003, ICS '03.
[294] Jeannette M. Wing,et al. Tools for Generating and Analyzing Attack Graphs , 2003, FMCO.
[295] Michael Atighetchi,et al. Adaptive cyberdefense for survival and intrusion tolerance , 2004, IEEE Internet Computing.
[296] Sudipta Sengupta,et al. Capacity efficient distributed routing of mesh-restored lightpaths in optical networks , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).
[297] Yu Liu,et al. Approximating optimal spare capacity allocation by successive survivable routing , 2005, TNET.
[298] N. Golmie,et al. A differentiated optical services model for WDM networks , 2000, IEEE Commun. Mag..
[299] W.E. Falconer,et al. Service assurance in modern telecommunications networks , 1990, IEEE Communications Magazine.
[300] Bernhard Plattner,et al. Scalable high speed IP routing lookups , 1997, SIGCOMM '97.
[301] Robert E. Tarjan,et al. Depth-First Search and Linear Graph Algorithms , 1972, SIAM J. Comput..
[302] Kishor S. Trivedi,et al. Performability Analysis: Measures, an Algorithm, and a Case Study , 1988, IEEE Trans. Computers.
[303] Henrique Madeira,et al. Generic faultloads based on software faults for dependability benchmarking , 2004, International Conference on Dependable Systems and Networks, 2004.
[304] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[305] Wenliang Du,et al. Testing for software vulnerability using environment perturbation , 2000, Proceeding International Conference on Dependable Systems and Networks. DSN 2000.
[306] Ravishankar K. Iyer,et al. An experimental study of security vulnerabilities caused by errors , 2001, 2001 International Conference on Dependable Systems and Networks.
[307] Biswanath Mukherjee,et al. TRAFFIC ENGINEERING FOR MULTI-LAYER NETWORKS , 2007 .
[308] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[309] Anup K. Ghosh,et al. An approach to testing COTS software for robustness to operating system exceptions and errors , 1999, Proceedings 10th International Symposium on Software Reliability Engineering (Cat. No.PR00443).
[310] Axel W. Krings,et al. A Probabilistic Approach for Task and Result Certification of Large-Scale Distributed Applications in Hostile Environments , 2005, EGC.
[311] Kishor S. Trivedi,et al. Performance And Reliability Analysis Of Computer Systems (an Example-based Approach Using The Sharpe Software , 1997, IEEE Transactions on Reliability.
[312] Peter Oehlert,et al. Violating Assumptions with Fuzzing , 2005, IEEE Secur. Priv..
[313] Tsong-Ho Wu,et al. Fiber Network Service Survivability , 1992 .
[314] Teresa A. Dahlberg,et al. Survivability Analysis for Mobile Cellular Networks , 2005 .
[315] Marc Dacier,et al. Mining intrusion detection alarms for actionable knowledge , 2002, KDD.
[316] A.W. Krings,et al. Fault-Models in Wireless Communication: Towards Survivable Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[317] Malgorzata Steinder,et al. Increasing robustness of fault localization through analysis of lost, spurious, and positive symptoms , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[318] Tao Wu,et al. Attack monitoring and localization in all-optical networks , 2002, SPIE ITCom.
[319] Fred B. Schneider,et al. Towards Fault-Tolerant and Secure Agentry , 1997, WDAG.
[320] Oleg Sheyner,et al. Attack scenario graphs for computer network threat analysis and prediction , 2003, Complex.
[321] Robbert van Renesse,et al. Operating system support for mobile agents , 1995, Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V).
[322] Christopher Krügel,et al. Evaluating the impact of automated intrusion response mechanisms , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[323] Hari Balakrishnan,et al. Resilient overlay networks , 2001, SOSP.
[324] J. H. Weber,et al. A simulation study of routing and control in communications networks , 1964 .
[325] Cynthia A. Phillips,et al. A graph-based system for network-vulnerability analysis , 1998, NSPW '98.
[326] Jean Arlat,et al. Fault Injection and Dependability Evaluation of Fault-Tolerant Systems , 1993, IEEE Trans. Computers.
[327] John McHugh,et al. Survivable Network Analysis Method , 2000 .
[328] Kevin A. Kwiat,et al. Modeling the spread of active worms , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[329] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[330] Jie Gao,et al. Approaches to building self healing systems using dependency analysis , 2004, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507).
[331] Fred J. Kaudel,et al. Framework for network survivability performance , 1994, IEEE J. Sel. Areas Commun..
[332] T. Basar,et al. A game theoretic approach to decision and analysis in network intrusion detection , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).
[333] Rami G. Melhem,et al. Roaming honeypots for mitigating service-level denial-of-service attacks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[334] Jiankun Hu,et al. Intrusion Detection Based on Data Mining , 2003, ICEIS.
[335] Richard E. Schantz,et al. Survival by defense-enabling , 2001, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[336] Yi-Bing Lin,et al. Per-user checkpointing for mobility database failure restoration , 2005, IEEE Transactions on Mobile Computing.
[337] George W Bush,et al. The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets , 2003 .
[338] James A. Whittaker. How to Break Software , 2000 .
[339] Svein J. Knapskog,et al. Incorporating Attacker Behavior in Stochastic Models of Security , 2005, Security and Management.
[340] Arie M. C. A. Koster,et al. Demand-wise Shared Protection for Meshed Optical Networks , 2005, Journal of Network and Systems Management.
[341] Svein J. Knapskog,et al. A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[342] Junfeng Yang,et al. An empirical study of operating systems errors , 2001, SOSP.
[343] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[344] Pradeep K. Khosla,et al. Selecting the Right Data Distribution Scheme for a Survivable Storage System (CMU-CS-01-120) , 2001 .
[345] Kevin R. Fall,et al. A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.
[346] Piet Demeester,et al. Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS , 2004 .
[347] Jean Arlat,et al. MAFALDA-RT: a tool for dependability assessment of real-time systems , 2002, Proceedings International Conference on Dependable Systems and Networks.
[348] M. L. Jones. A carrier perspective on all-optical networks , 2002, IEEE/LEOS Summer Topi All-Optical Networking: Existing and Emerging Architecture and Applications/Dynamic Enablers of Next-Generation Optical Communications Systems/Fast Optical Processing in Optical.
[349] Sheng Ma,et al. Optimizing Probe Selection for Fault Localization , 2001, DSOM.
[350] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[351] Gunnar Karlsson,et al. Techniques to reduce the IEEE 802.11b handoff time , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[352] Jiankun Hu,et al. A multi-layer model for anomaly intrusion detection using program sequences of system calls , 2003, The 11th IEEE International Conference on Networks, 2003. ICON2003..
[353] Erland Jonsson,et al. An integrated framework for security and dependability , 1998, NSPW '98.
[354] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[355] Kishor S. Trivedi,et al. Characterizing intrusion tolerant systems using a state transition model , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[356] Wayne D. Grover,et al. Shared-Risk Logical Span Groups in Span-Restorable Optical Networks: Analysis and Capacity Planning Model , 2005, Photonic Network Communications.
[357] Kaveh Pahlavan,et al. Handoff in hybrid mobile data networks , 2000, IEEE Wirel. Commun..
[358] Klaus H. Ecker,et al. Scheduling Computer and Manufacturing Processes , 2001 .
[359] Bharat B. Madan,et al. A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.
[360] Joobin Choobineh,et al. Trust in electronic commerce: definition and theoretical considerations , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.
[361] Achim Autenrieth,et al. Optimal configuration of p-cycles in WDM networks , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[362] David Wright,et al. Towards Operational Measures of Computer Security , 1993, J. Comput. Secur..
[363] Albert G. Greenberg,et al. Experience in black-box OSPF measurement , 2001, IMW '01.
[364] Yi Qian,et al. Towards Survivable and Secure Wireless Sensor Networks , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.
[365] Mari Maeda. Management and control of transparent optical networks , 1998, IEEE J. Sel. Areas Commun..
[366] Nancy R. Mead,et al. Survivable Network System Analysis: A Case Study , 1999, IEEE Softw..
[367] D. Tipper,et al. Topological design of 3G wireless backhaul networks for service assurance , 2005, DRCN 2005). Proceedings.5th International Workshop on Design of Reliable Communication Networks, 2005..
[368] Li Zhou,et al. Integrated access control and intrusion detection for Web Servers , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[369] Erland Jonsson,et al. Towards an integrated conceptual model of security and dependability , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[370] Peter Kubat,et al. Design of cellular networks with diversity and capacity constraints , 2000, IEEE Trans. Reliab..
[371] Barton P. Miller,et al. An empirical study of the reliability of UNIX utilities , 1990, Commun. ACM.
[372] Alessandro Birolini. Reliability Engineering: Theory and Practice , 1999 .
[373] R. Larson,et al. Linux Kernel , 2003 .
[374] Edmund M. Clarke,et al. Ranking Attack Graphs , 2006, RAID.
[375] Muriel Médard,et al. Attack Detection Methods for All-Optical Networks , 1998, NDSS.
[376] Nick McKeown,et al. Routing lookups in hardware at memory access speeds , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.
[377] Peter G. Neumann,et al. Experience with EMERALD to Date , 1999, Workshop on Intrusion Detection and Network Monitoring.
[378] Tao Wu,et al. Cross-talk attack monitoring and localization in all-optical networks , 2005, IEEE/ACM Transactions on Networking.
[379] Arun K. Somani. Survivability and Traffic Grooming in WDM Optical Networks , 2006 .
[380] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[381] Tao Wu,et al. Necessary and sufficient condition for k crosstalk attacks localization in all-optical networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[382] Kishor S. Trivedi,et al. A General Framework for Network Survivability Quantification , 2004, MMB.
[383] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[384] Teresa A. Dahlberg,et al. Providing fault tolerance in wireless access networks , 2002, IEEE Commun. Mag..
[385] Elisa Bertino,et al. PP-trust-X: A system for privacy preserving trust negotiations , 2007, TSEC.
[386] Myung J. Lee,et al. Toward Secure Low Rate Wireless Personal Area Networks , 2006, IEEE Transactions on Mobile Computing.
[387] Peng Ning,et al. Learning attack strategies from intrusion alerts , 2003, CCS '03.
[388] Kazutaka Murakami,et al. Virtual path routing for survivable ATM networks , 1996, TNET.