Information Assurance : Dependability and Security in Networked Systems

In today's fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks

[1]  Salvatore J. Stolfo,et al.  Toward Cost-Sensitive Modeling for Intrusion Detection and Response , 2002, J. Comput. Secur..

[2]  Hervé Debar,et al.  Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.

[3]  Svein J. Knapskog,et al.  Using Stochastic Game Theory to Compute the Expected Behavior of Attackers , 2005 .

[4]  Nick McKeown,et al.  Algorithms for packet classification , 2001, IEEE Netw..

[5]  Shoa-Kai Liu Challenges of all-optical network evolution , 1998, Conference Proceedings. LEOS'98. 11th Annual Meeting. IEEE Lasers and Electro-Optics Society 1998 Annual Meeting (Cat. No.98CH36243).

[6]  Jean Arlat,et al.  Characterization of the impact of faulty drivers on the robustness of the Linux kernel , 2004, International Conference on Dependable Systems and Networks, 2004.

[7]  Tomas Olovsson,et al.  A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior , 1997, IEEE Trans. Software Eng..

[8]  Biswanath Mukherjee,et al.  IP resilience within an autonomous system: current approaches, challenges, and future directions , 2005, IEEE Communications Magazine.

[9]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[10]  Barton P. Miller,et al.  An empirical study of the robustness of MacOS applications using random testing , 2006, RT '06.

[11]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[12]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[13]  Markus Straßer,et al.  A fault-tolerant protocol for providing the exactly-once property of mobile agents , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).

[14]  Hideo Fujiwara,et al.  Logic Testing and Design for Testability , 1985 .

[15]  Marian Marciniak Optical transparency in next generation IP over all-optical networks , 2001, Proceedings of 2001 3rd International Conference on Transparent Optical Networks (IEEE Cat. No.01EX488).

[16]  Yu Liu,et al.  Spare Capacity Allocation in Two-Layer Networks , 2007, IEEE Journal on Selected Areas in Communications.

[17]  Carsten Lund,et al.  Flow sampling under hard resource constraints , 2004, SIGMETRICS '04/Performance '04.

[18]  R. Antosik Protection and restoration in optical networks , 2000, 2000 2nd International Conference on Transparent Optical Networks. Conference Proceedings (Cat. No.00EX408).

[19]  Fred B. Schneider,et al.  Implementing trustworthy services using replicated state machines , 2005, IEEE Security & Privacy Magazine.

[20]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[21]  Wojciech Molisz Survivability function - a measure of disaster-based routing performance , 2004, IEEE Journal on Selected Areas in Communications.

[22]  Ming-Yang Kao,et al.  Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[23]  Yun Liu and Kishore S. Trivedi,et al.  Survivability Quantification: The Analytical Modeling Approach , 2006 .

[24]  Yan Chen,et al.  Reversible sketches for efficient and accurate change detection over network data streams , 2004, IMC '04.

[25]  Yee Wei Law,et al.  A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks , 2003, PWC.

[26]  Jeffrey M. Voas Building software recovery assertions from a fault injection-based propagation analysis , 1997, Proceedings Twenty-First Annual International Computer Software and Applications Conference (COMPSAC'97).

[27]  Sheng Ma,et al.  Real-time problem determination in distributed systems using active probing , 2004, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507).

[28]  Ian F. Akyildiz,et al.  A survey on wireless mesh networks , 2005, IEEE Communications Magazine.

[29]  Sushil Jajodia,et al.  Minimum-cost network hardening using attack graphs , 2006, Comput. Commun..

[30]  Indrajit Ray,et al.  Using Attack Trees to Identify Malicious Attacks from Authorized Insiders , 2005, ESORICS.

[31]  Alan T. Sherman,et al.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..

[32]  Paul Ammann,et al.  Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[33]  Frank Hill,et al.  Wrapping windows NT software for robustness , 1999, Digest of Papers. Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing (Cat. No.99CB36352).

[34]  Roger M. Kieckhafer,et al.  Exploiting Omissive Faults in Synchronous Approximate Agreement , 2000, IEEE Trans. Computers.

[35]  J. M. Akinpelu,et al.  The overload performance of engineered networks with nonhierarchical and hierarchical routing , 1984, AT&T Bell Laboratories Technical Journal.

[36]  K. Kyamakya,et al.  Security and survivability of distributed systems: an overview , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).

[37]  Peng Ning,et al.  Integrating IDS Alert Correlation and OS-Level Dependency Tracking , 2006, ISI.

[38]  Glenford J. Myers,et al.  Art of Software Testing , 1979 .

[39]  Sheldon M. Ross Introduction to Probability Models. , 1995 .

[40]  Jean Arlat,et al.  Benchmarking the dependability of Windows NT4, 2000 and XP , 2004, International Conference on Dependable Systems and Networks, 2004.

[41]  Wenke Lee,et al.  Discovering Novel Attack Strategies from INFOSEC Alerts , 2004, ESORICS.

[42]  Marco Ajmone Marsan,et al.  Modelling with Generalized Stochastic Petri Nets , 1995, PERV.

[43]  Stefan Savage,et al.  Inferring Internet denial-of-service activity , 2001, TOCS.

[44]  B. Dutertre,et al.  Intrusion tolerant software architectures , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[45]  Neeraj Suri,et al.  Error propagation profiling of operating systems , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[46]  Somesh Jha,et al.  Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[47]  Yi-Bing Lin Failure restoration of mobility databases for personal communication networks , 1995, Wirel. Networks.

[48]  Peter Brucker,et al.  Scheduling Algorithms , 1995 .

[49]  Wayne D. Grover,et al.  Cycle-oriented distributed preconfiguration: ring-like speed with mesh-like capacity for self-planning network restoration , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).

[50]  Jean Arlat,et al.  Dependability of COTS Microkernel-Based Systems , 2002, IEEE Trans. Computers.

[51]  Paola Velardi,et al.  Hardware-Related Software Errors: Measurement and Analysis , 1985, IEEE Transactions on Software Engineering.

[52]  Robert K. Cunningham,et al.  Fusing A Heterogeneous Alert Stream Into Scenarios , 2002, Applications of Data Mining in Computer Security.

[53]  Jiankun Hu,et al.  An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).

[54]  William H. Sanders,et al.  Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.

[55]  Ravindra K. Ahuja,et al.  Network Flows: Theory, Algorithms, and Applications , 1993 .

[56]  Matti A. Hiltunen,et al.  Building Survivable Services Using Redundancy and Adaptation , 2003, IEEE Trans. Computers.

[57]  Ravishankar K. Iyer,et al.  Faults, symptoms, and software fault tolerance in the Tandem GUARDIAN90 operating system , 1993, FTCS-23 The Twenty-Third International Symposium on Fault-Tolerant Computing.

[58]  Carl E. Landwehr,et al.  A taxonomy of computer program security flaws , 1993, CSUR.

[59]  Deep Medhi,et al.  A key-chain-based keying scheme for many-to-many secure group communication , 2004, TSEC.

[60]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[61]  Daniel P. Siewiorek,et al.  Development of a benchmark to measure system robustness , 1993, FTCS-23 The Twenty-Third International Symposium on Fault-Tolerant Computing.

[62]  Deep Medhi,et al.  A unified approach to network survivability for teletraffic networks: models, algorithms and analysis , 1994, IEEE Trans. Commun..

[63]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[64]  S. Jafar,et al.  Certification of large distributed computations with task dependencies in hostile environments , 2005, 2005 IEEE International Conference on Electro Information Technology.

[65]  Kishor S. Trivedi,et al.  Security analysis of SITAR intrusion tolerance system , 2003, SSRS '03.

[66]  Dijiang Huang,et al.  On providing confidentiality in link state routing protocol , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[67]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[68]  Marc J. Schniederjans,et al.  New architecture for intra-domain network security issues , 2006, CACM.

[69]  Elisa Bertino,et al.  XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! , 2006, SACMAT '06.

[70]  Deep Medhi,et al.  On providing survivable QoS services in the next generation Internet , 1999, MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341).

[71]  Eugene H. Spafford,et al.  The COPS Security Checker System , 1990, USENIX Summer.

[72]  Daniel P. Siewiorek,et al.  Comparing operating systems using robustness benchmarks , 1997, Proceedings of SRDS'97: 16th IEEE Symposium on Reliable Distributed Systems.

[73]  Udo W. Pooch,et al.  Adaptation techniques for intrusion detection and intrusion response systems , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[74]  Giovanni Vigna,et al.  NetSTAT: A Network-based Intrusion Detection System , 1999, J. Comput. Secur..

[75]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[76]  Jean Arlat,et al.  Impact of Internal and External Software Faults on the Linux Kernel , 2003 .

[77]  Wayne D. Grover,et al.  Advances in optical network design with p-cycles: joint optimization and pre-selection of candidate p-cycles , 2002, IEEE/LEOS Summer Topi All-Optical Networking: Existing and Emerging Architecture and Applications/Dynamic Enablers of Next-Generation Optical Communications Systems/Fast Optical Processing in Optical.

[78]  Vishwani D. Agrawal,et al.  Unified Methods for VLSI Simulation and Test Generation , 1989 .

[79]  Yan Gao,et al.  A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[80]  C.G. Gruber,et al.  A computational study for demand-wise shared protection , 2005, DRCN 2005). Proceedings.5th International Workshop on Design of Reliable Communication Networks, 2005..

[81]  Gabriel Junyent,et al.  Optical monitoring system for scalable all-optical networks , 1997, Conference Proceedings. LEOS '97. 10th Annual Meeting IEEE Lasers and Electro-Optics Society 1997 Annual Meeting.

[82]  Yakov Rekhter,et al.  BGP/MPLS IP Virtual Private Networks (VPNs) , 2006, RFC.

[83]  David Tipper,et al.  PCS network survivability , 1999, WCNC. 1999 IEEE Wireless Communications and Networking Conference (Cat. No.99TH8466).

[84]  Gregory L. Frazier,et al.  Autonomic defense: Thwarting automated attacks via real-time feedback control , 2003, Complex..

[85]  Cem Kaner,et al.  Testing Computer Software, Second Edition , 1993 .

[86]  John Moy,et al.  OSPF Version 2 , 1998, RFC.

[87]  Wenke Lee,et al.  Statistical Causality Analysis of INFOSEC Alert Data , 2003, RAID.

[88]  Y. C. Yeh,et al.  Triple-triple redundant 777 primary flight computer , 1996, 1996 IEEE Aerospace Applications Conference. Proceedings.

[89]  Jeffrey D. Ullman,et al.  Protection in operating systems , 1976, CACM.

[90]  George Varghese,et al.  On Scalable Attack Detection in the Network , 2004, IEEE/ACM Transactions on Networking.

[91]  Peter Adams,et al.  Next-Generation Network , 2022 .

[92]  Wei Xin,et al.  The MONET project-a final report , 2000, Journal of Lightwave Technology.

[93]  I. Stojmenovic,et al.  Mobile Ad Hoc Networking with a View of 4G Wireless: Imperatives and Challenges , 2004 .

[94]  Axel W. Krings,et al.  Agent survivability: an application for strong and weak chain constrained scheduling , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[95]  Neeraj Suri,et al.  On the Selection of Error Model(s) for OS Robustness Evaluation , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).

[96]  Malcolm I. Heywood,et al.  Training genetic programming on half a million patterns: an example from anomaly detection , 2005, IEEE Transactions on Evolutionary Computation.

[97]  Joe Marshall,et al.  Measuring robustness of a fault tolerant aerospace system , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing. Digest of Papers.

[98]  Suresh Subramaniam,et al.  Survivability in optical networks , 2000, IEEE Netw..

[99]  Jeannette M. Wing,et al.  Game strategies in network security , 2005, International Journal of Information Security.

[100]  Giovanni Vigna,et al.  STATL: An Attack Language for State-Based Intrusion Detection , 2002, J. Comput. Secur..

[101]  J. H. Lala Intrusion tolerant systems , 2000, Proceedings. 2000 Pacific Rim International Symposium on Dependable Computing.

[102]  Sharath Pankanti,et al.  Filterbank-based fingerprint matching , 2000, IEEE Trans. Image Process..

[103]  Jeffrey M. Voas,et al.  Certifying Off-the-Shelf Software Components , 1998, Computer.

[104]  Basil S. Maglaris,et al.  Distributed Management Architecture for Cooperative Detection and Reaction to DDoS Attacks , 2004, Journal of Network and Systems Management.

[105]  Axel W. Krings,et al.  The test vector problem and limitations to evolving digital circuits , 2000, Proceedings. The Second NASA/DoD Workshop on Evolvable Hardware.

[106]  Daniel P. Newman,et al.  Penetration Testing and Cisco Network Defense , 2005 .

[107]  Brian Randell,et al.  Fundamental Concepts of Dependability , 2000 .

[108]  David Tipper,et al.  Risk reduction based survivable WDM network design , 2006, 2006 IEEE International Performance Computing and Communications Conference.

[109]  Laura Painton Swiler,et al.  A graph-based network-vulnerability analysis system , 1997, S&P 1998.

[110]  Sushil Jajodia,et al.  An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts , 2005, ESORICS.

[111]  Barton P. Miller,et al.  An empirical study of the robustness of Windows NT applications using random testing , 2000 .

[112]  Morrie Gasser,et al.  The Digital Distributed System Security Architecture , 1989 .

[113]  J. Fee All-optical network technology enablers , 1997, Proceedings of Optical Fiber Communication Conference (.

[114]  J-C. Laprie,et al.  DEPENDABLE COMPUTING AND FAULT TOLERANCE : CONCEPTS AND TERMINOLOGY , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'..

[115]  W. J. Blackert,et al.  Analyzing interaction between distributed denial of service attacks and mitigation technologies , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[116]  Yves Crouzet,et al.  Benchmarking the dependability of Windows and Linux using PostMark/spl trade/ workloads , 2005, 16th IEEE International Symposium on Software Reliability Engineering (ISSRE'05).

[117]  Phillip A. Laplante,et al.  Dictionary of Computer Science, Engineering, and Technology , 2000 .

[118]  Jiankun Hu,et al.  Enhanced gradient-based algorithm for the estimation of fingerprint orientation fields , 2007, Appl. Math. Comput..

[119]  Kishor S. Trivedi,et al.  Survivability analysis of telephone access network , 2004, 15th International Symposium on Software Reliability Engineering.

[120]  Georg Stellner,et al.  CoCheck: checkpointing and process migration for MPI , 1996, Proceedings of International Conference on Parallel Processing.

[121]  Edmundo de Souza e Silva,et al.  Performability Analysis of Computer Systems: From Model Spacification to Solution , 1992, Perform. Evaluation.

[122]  Eugene H. Spafford,et al.  ADEPTS: adaptive intrusion response using attack graphs in an e-commerce environment , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[123]  Malgorzata Steinder,et al.  Probabilistic fault diagnosis in communication systems through incremental hypothesis updating , 2004, Comput. Networks.

[124]  Kevin J. Sullivan,et al.  Towards a rigorous definition of information system survivability , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[125]  Rodolphe Ortalo,et al.  Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..

[126]  Daniel P. Siewiorek,et al.  Measuring Software Dependability by Robustness Benchmarking , 1997, IEEE Trans. Software Eng..

[127]  Fred B. Schneider,et al.  NAP: practical fault-tolerance for itinerant computations , 1999, Proceedings. 19th IEEE International Conference on Distributed Computing Systems (Cat. No.99CB37003).

[128]  Dijiang Huang,et al.  Network protection design for MPLS networks , 2005, DRCN 2005). Proceedings.5th International Workshop on Design of Reliable Communication Networks, 2005..

[129]  Louis Anthony Cox,et al.  Designing Least-Cost Survivable Wireless Backhaul Networks , 2000, J. Heuristics.

[130]  Morton E. O'Kelly,et al.  A geographic perspective on commercial Internet survivability , 2003, Telematics Informatics.

[131]  Anup K. Ghosh,et al.  Testing the robustness of Windows NT software , 1998, Proceedings Ninth International Symposium on Software Reliability Engineering (Cat. No.98TB100257).

[132]  C. R. Ramakrishnan,et al.  Model-Based Analysis of Configuration Vulnerabilities , 2002, J. Comput. Secur..

[133]  Udo W. Pooch,et al.  Cooperating security managers: a peer-based intrusion detection system , 1996, IEEE Netw..

[134]  Hermann Kopetz,et al.  Dependability: Basic Concepts and Terminology , 1992 .

[135]  Davide Grillo Personal communications and traffic engineering in ITU-T: the developing E.750-series of recommendations , 1996, IEEE Wirel. Commun..

[136]  Luis F. G. Sarmenta Sabotage-tolerance mechanisms for volunteer computing systems , 2002, Future Gener. Comput. Syst..

[137]  Hari Balakrishnan,et al.  Fast portscan detection using sequential hypothesis testing , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[138]  Randal E. Bryant,et al.  Graph-Based Algorithms for Boolean Function Manipulation , 1986, IEEE Transactions on Computers.

[139]  Ravishankar K. Iyer,et al.  Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors , 2002 .

[140]  Ravishankar K. Iyer,et al.  Characterization of linux kernel behavior under errors , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..

[141]  David Tipper,et al.  Prioritized traffic restoration in connection oriented QoS based networks , 2003, Comput. Commun..

[142]  Wayne D. Grover,et al.  New options and insights for survivable transport networks , 2002, IEEE Commun. Mag..

[143]  Wayne D. Grover,et al.  Hamiltonian p-cycles for fiber-level protection in semi-homogeneous homogeneous and optical networks , 2004, IEEE Network.

[144]  Ramesh Bhandari Survivable Networks: Algorithms for Diverse Routing , 1998 .

[145]  Algirdas Avizienis,et al.  The N-Version Approach to Fault-Tolerant Software , 1985, IEEE Transactions on Software Engineering.

[146]  Eugene H. Spafford,et al.  Automated adaptive intrusion containment in systems of interacting services , 2007, Comput. Networks.

[147]  Jeannette M. Wing,et al.  Scenario graphs and attack graphs , 2004 .

[148]  Stuart Staniford-Chen,et al.  Practical Automated Detection of Stealthy Portscans , 2002, J. Comput. Secur..

[149]  Elisa Bertino,et al.  Achieving privacy in trust negotiations with an ontology-based approach , 2006, IEEE Transactions on Dependable and Secure Computing.

[150]  Sandeep Sharma,et al.  An analysis of the congestion effects of link failures in wide area networks , 1994, IEEE J. Sel. Areas Commun..

[151]  S. Jafar,et al.  Theft-induced checkpointing for reconfigurable dataflow applications , 2005, 2005 IEEE International Conference on Electro Information Technology.

[152]  Haiyun Luo,et al.  UCAN: a unified cellular and ad-hoc network architecture , 2003, MobiCom '03.

[153]  Dhiraj K. Pradhan,et al.  Consensus With Dual Failure Modes , 1991, IEEE Trans. Parallel Distributed Syst..

[154]  Sushil Jajodia,et al.  Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts , 2006, Comput. Commun..

[155]  Izhak Rubin,et al.  Failure protection methods for optical meshed-ring communications networks , 2000, IEEE Journal on Selected Areas in Communications.

[156]  Neeraj Suri,et al.  EPIC: profiling the propagation and effect of data errors in software , 2004, IEEE Transactions on Computers.

[157]  Amitava Dutta,et al.  Design of partially survivable networks for cellular telecommunication systems , 1999, Eur. J. Oper. Res..

[158]  Steven J. Templeton,et al.  A requires/provides model for computer attacks , 2001, NSPW '00.

[159]  Wayne D. Grover,et al.  Mesh-based Survivable Transport Networks: Options and Strategies for Optical, MPLS, SONET and ATM Networking , 2003 .

[160]  Navjot Singh,et al.  Reliability testing of applications on Windows NT , 2000, Proceeding International Conference on Dependable Systems and Networks. DSN 2000.

[161]  L. Shapley,et al.  Stochastic Games* , 1953, Proceedings of the National Academy of Sciences.

[162]  Lee Badger,et al.  Security agility in response to intrusion detection , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).

[163]  Deep Medhi,et al.  A double authentication scheme to detect impersonation attack in link state routing protocols , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[164]  Jerome H. Saltzer,et al.  End-to-end arguments in system design , 1984, TOCS.

[165]  Jiankun Hu,et al.  A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[166]  R. C. Alferness The all-optical networks , 2000, WCC 2000 - ICCT 2000. 2000 International Conference on Communication Technology Proceedings (Cat. No.00EX420).

[167]  Franck Cappello,et al.  Coordinated checkpoint versus message log for fault tolerant MPI , 2004, 2003 Proceedings IEEE International Conference on Cluster Computing.

[168]  Vern Paxson,et al.  Proceedings of the 13th USENIX Security Symposium , 2022 .

[169]  Christopher Krügel,et al.  Comprehensive approach to intrusion detection alert correlation , 2004, IEEE Transactions on Dependable and Secure Computing.

[170]  Pierre Wolper,et al.  Simple on-the-fly automatic verification of linear temporal logic , 1995, PSTV.

[171]  Ravishankar K. Iyer,et al.  An experimental evaluation of the REE SIFT environment for spaceborne applications , 2002, Proceedings International Conference on Dependable Systems and Networks.

[172]  K. Steiglitz,et al.  The Design of Minimum-Cost Survivable Networks , 1969 .

[173]  William A. Arbaugh,et al.  Real 802.11 Security: Wi-Fi Protected Access and 802.11i , 2003 .

[174]  Jan Camenisch,et al.  Design and implementation of the idemix anonymous credential system , 2002, CCS '02.

[175]  Elisa Bertino,et al.  Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[176]  Christian Cachin,et al.  Distributing trust on the Internet , 2001, 2001 International Conference on Dependable Systems and Networks.

[177]  William H. Sanders,et al.  Probabilistic validation of an intrusion-tolerant replication system , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..

[178]  Jean Arlat,et al.  Building dependable COTS microkernel-based systems using MAFALDA , 2000, Proceedings. 2000 Pacific Rim International Symposium on Dependable Computing.

[179]  William A. Arbaugh,et al.  Improving the latency of 802.11 hand-offs using neighbor graphs , 2004, MobiSys '04.

[180]  Peng Ning,et al.  Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.

[181]  Somesh Jha,et al.  Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.

[182]  Kumar N. Sivarajan,et al.  Optical Networks: A Practical Perspective , 1998 .

[183]  Ravishankar K. Iyer,et al.  An approach towards benchmarking of fault-tolerant commercial systems , 1996, Proceedings of Annual Symposium on Fault Tolerant Computing.

[184]  Philip Koopman,et al.  Comparing the robustness of POSIX operating systems , 1999, Digest of Papers. Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing (Cat. No.99CB36352).

[185]  Dan Schnackenberg,et al.  Infrastructure for intrusion detection and response , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[186]  Brett Wilson,et al.  Autonomic Response to Distributed Denial of Service Attacks , 2001, Recent Advances in Intrusion Detection.

[187]  Jacek Blazewicz,et al.  Scheduling Multiprocessor Tasks on Three Dedicated Processors , 1992, Inf. Process. Lett..

[188]  G. Buja,et al.  Conceptual frameworks for dependability and safety of a system , 2006, International Symposium on Power Electronics, Electrical Drives, Automation and Motion, 2006. SPEEDAM 2006..

[189]  Jian Wang,et al.  A Novel Quantitative Analysis Method for Network Survivability , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).

[190]  Deep Medhi,et al.  Network routing - algorithms, protocols, and architectures , 2007 .

[191]  Svein J. Knapskog,et al.  Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems , 2005, CIS.

[192]  Malgorzata Steinder,et al.  Yemanja—A Layered Fault Localization System for Multi-Domain Computing Utilities , 2002, Journal of Network and Systems Management.

[193]  Jacob A. Abraham,et al.  FERRARI: A Flexible Software-Based Fault and Error Injection System , 1995, IEEE Trans. Computers.

[194]  P. E. Wirth,et al.  Teletraffic implications of database architectures in mobile and personal communications , 1995, IEEE Commun. Mag..

[195]  David Levin,et al.  Survivable mobile wireless networks: issues, challenges, and research directions , 2002, WiSE '02.

[196]  Cynthia A. Phillips,et al.  Computer-attack graph generation tool , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[197]  Özalp Babaoglu,et al.  Streets of Byzantium: Network Architectures for Fast Reliable Broadcasts , 1985, IEEE Transactions on Software Engineering.

[198]  O. Patrick Kreidl,et al.  Feedback control applied to survivability: a host-based autonomic defense system , 2004, IEEE Transactions on Reliability.

[199]  Raphael R. Some,et al.  Experimental evaluation of a COTS system for space applications , 2002, Proceedings International Conference on Dependable Systems and Networks.

[200]  Richard Bejtlich,et al.  The Tao of Network Security Monitoring: Beyond Intrusion Detection , 2004 .

[201]  Xinming Ou,et al.  A scalable approach to attack graph generation , 2006, CCS '06.

[202]  Xinghuo Yu,et al.  A Biometric Encryption Approach Incorporating Fingerprint Indexing in Key Generation , 2006, ICIC.

[203]  Judith N. Froscher,et al.  Merging paradigms of survivability and security: stochastic faults and designed faults , 2003, NSPW '03.

[204]  Somesh Jha,et al.  Survivability analysis of network specifications , 2000, Proceeding International Conference on Dependable Systems and Networks. DSN 2000.

[205]  Elisa Bertino,et al.  Trust-/spl Xscr/;: a peer-to-peer framework for trust establishment , 2004, IEEE Transactions on Knowledge and Data Engineering.

[206]  Elisa Bertino,et al.  X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control , 2005, TSEC.

[207]  Miron Livny,et al.  Checkpoint and Migration of UNIX Processes in the Condor Distributed Processing System , 1997 .

[208]  Arun K. Somani Sequential Fault Occurrence and Reconfiguration in System Level Diagnosis , 1990, IEEE Trans. Computers.

[209]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[210]  Nancy R. Mead,et al.  Survivable Network Systems: An Emerging Discipline , 1997 .

[211]  Prashant Krishnamurthy,et al.  The interaction of security and survivability in hybrid wireless networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[212]  Peng Ning,et al.  Alert correlation through triggering events and common resources , 2004, 20th Annual Computer Security Applications Conference.

[213]  Svein J. Knapskog,et al.  Towards a stochastic model for integrated security and dependability evaluation , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[214]  Diamantino Costa,et al.  Fault injection spot-checks computer system dependability , 1999 .

[215]  Henrique Madeira,et al.  Xception: A Technique for the Experimental Evaluation of Dependability in Modern Computers , 1998, IEEE Trans. Software Eng..

[216]  Somesh Jha,et al.  Survivability analysis of networked systems , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.

[217]  Apostolis K. Salkintzis,et al.  WLAN-GPRS integration for next-generation mobile data networks , 2002, IEEE Wirel. Commun..

[218]  Stefan Savage,et al.  The Spread of the Sapphire/Slammer Worm , 2003 .

[219]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[220]  Gangxiang Shen,et al.  Design of Survivable Networks Based on p-Cycles , 2006, Handbook of Optimization in Telecommunications.

[221]  Eugene L. Lawler,et al.  Sequencing and scheduling: algorithms and complexity , 1989 .

[222]  Henrique Madeira,et al.  Multidimensional Characterization of the Impact of Faulty Drivers on the Operating Systems Behavior , 2003 .

[223]  Jean Arlat,et al.  Analysis of the effects of real and injected software faults: Linux as a case study , 2002, 2002 Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings..

[224]  David K. Y. Yau,et al.  Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles , 2005, IEEE/ACM Transactions on Networking.

[225]  Sushil Jajodia,et al.  Efficient minimum-cost network hardening via exploit dependency graphs , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..

[226]  Peng Liu,et al.  Incentive-based modeling and inference of attacker intent, objectives, and strategies , 2003, CCS '03.

[227]  Philip M. Thambidurai,et al.  Interactive consistency with multiple failure modes , 1988, Proceedings [1988] Seventh Symposium on Reliable Distributed Systems.

[228]  Kishor S. Trivedi,et al.  Network survivability performance evaluation:: a quantitative approach with applications in wireless ad-hoc networks , 2002, MSWiM '02.

[229]  Archana Ganapathi,et al.  Windows XP Kernel Crash Analysis , 2006, LISA.

[230]  Ehab Al-Shaer,et al.  QoS Path Monitoring for Multicast Networks , 2002, Journal of Network and Systems Management.

[231]  Salvatore J. Stolfo,et al.  A coding approach to event correlation , 1995, Integrated Network Management.

[232]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[233]  Alan D. Ross,et al.  Network Security Essentials , 2003 .

[234]  L.M. Rossey,et al.  SARA: Survivable Autonomic Response Architecture , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[235]  Deep Medhi,et al.  Multi-layered network survivability-models, analysis, architecture, framework and implementation: an overview , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[236]  Charles A. Holt,et al.  The Nash equilibrium: A perspective , 2004, Proceedings of the National Academy of Sciences of the United States of America.

[237]  Nancy G. Leveson,et al.  An experimental evaluation of the assumption of independence in multiversion programming , 1986, IEEE Transactions on Software Engineering.

[238]  Muriel Medard,et al.  Security issues in all-optical networks , 1997 .

[239]  L. Alvisi,et al.  A Survey of Rollback-Recovery Protocols , 2002 .

[240]  Karl N. Levitt,et al.  NetKuang - A Multi-Host Configuration Vulnerability Checker , 1996, USENIX Security Symposium.

[241]  Elisa Bertino,et al.  GEO-RBAC: a spatially aware RBAC , 2005, SACMAT '05.

[242]  William L. Fithen,et al.  State of the Practice of Intrusion Detection Technologies , 2000 .

[243]  Graham Cormode,et al.  What's new: finding significant differences in network data streams , 2004, INFOCOM 2004.

[244]  Grzegorz Malewicz,et al.  Internet Computing of Tasks with Dependencies Using Unreliable Workers , 2004, OPODIS.

[245]  Robert K. Cunningham,et al.  Building Scenarios from a Heterogeneous Alert Stream , 2001 .

[246]  Brian N. Bershad,et al.  Improving the reliability of commodity operating systems , 2005, TOCS.

[247]  Anupam Joshi,et al.  Security for wireless sensor networks , 2004 .

[248]  Karl N. Levitt,et al.  Using Specification-Based Intrusion Detection for Automated Response , 2003, RAID.

[249]  Peter G. Neumann,et al.  EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.

[250]  Duminda Wijesekera,et al.  Scalable, graph-based network vulnerability analysis , 2002, CCS '02.

[251]  Ravishankar K. Iyer,et al.  Error sensitivity of the Linux kernel executing on PowerPC G4 and Pentium 4 processors , 2004, International Conference on Dependable Systems and Networks, 2004.

[252]  Fred B. Schneider,et al.  Byzantine generals in action: implementing fail-stop processors , 1984, TOCS.

[253]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[254]  Marco Listanti,et al.  Strategy for protection and restoration of optical paths in WDM backbone networks for next-generation Internet infrastructures , 2002 .

[255]  Gregory L. Frazier,et al.  A controller-based autonomic defense system , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[256]  Muriel Médard,et al.  Distributed Algorithms for Attack Localization in All-Optical Networks , 1998, NDSS.

[257]  John A. Buzacott Markov Approach to Finding Failure Times of Repairable Systems , 1970 .

[258]  Hung Q. Ngo,et al.  Towards a theory of insider threat assessment , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[259]  Volker Strumpen,et al.  Portable and fault-tolerant software systems , 1998, IEEE Micro.

[260]  Chung-Sheng Li,et al.  Fault detection, isolation, and open fiber control in transparent all-optical networks , 1996, Proceedings of GLOBECOM'96. 1996 IEEE Global Telecommunications Conference.

[261]  Rajiv Ramaswami,et al.  Automatic fault detection, isolation, and recovery in transparent all-optical networks , 1997 .

[262]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[263]  Frédéric Cuppens,et al.  Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[264]  Xinghuo Yu,et al.  A Novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based Banking Applications , 2006, ICB.

[265]  G. Jakobson,et al.  Alarm correlation , 1993, IEEE Network.

[266]  Vinod Yegneswaran,et al.  Internet intrusions: global characteristics and prevalence , 2003, SIGMETRICS '03.

[267]  Sriram K. Rajamani,et al.  The SLAM project: debugging system software via static analysis , 2002, POPL '02.

[268]  Balachander Krishnamurthy,et al.  Sketch-based change detection: methods, evaluation, and applications , 2003, IMC '03.

[269]  Kishor S. Trivedi Probability and Statistics with Reliability, Queuing, and Computer Science Applications , 1984 .

[270]  Frédéric Cuppens,et al.  LAMBDA: A Language to Model a Database for Detection of Attacks , 2000, Recent Advances in Intrusion Detection.

[271]  Kang G. Shin,et al.  Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[272]  Giorgio Ausiello,et al.  Structure Preserving Reductions among Convex Optimization Problems , 1980, J. Comput. Syst. Sci..

[273]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[274]  H. A. Malec,et al.  Communications reliability: a historical perspective , 1998 .

[275]  Chen-Nee Chuah,et al.  Analysis of link failures in an IP backbone , 2002, IMW '02.

[276]  Peter G. Neumann,et al.  Practical Architectures for Survivable Systems and Networks: Phase-One Final Report , 1999 .

[277]  Michael R. Lyu,et al.  Achieving software quality with testing coverage measures , 1994, Computer.

[278]  Peter Reiher,et al.  A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.

[279]  Jin Cao,et al.  Heuristic of differentiated path-shared protection for dual failures in restorable optical networks , 2007 .

[280]  Frank Harary,et al.  Graph Theory , 2016 .

[281]  Abhishek Kumar,et al.  Joint data streaming and sampling techniques for detection of super sources and destinations , 2005, IMC '05.

[282]  Jacek Blazewicz,et al.  Scheduling multiprocessor tasks of three dedicated processors information processing letters 41 (5) (1992) 275–280 , 1994 .

[283]  Frédéric Cuppens,et al.  Managing alerts in a multi-intrusion detection environment , 2001, Seventeenth Annual Computer Security Applications Conference.

[284]  Michael R. Lyu Software Fault Tolerance , 1995 .

[285]  Clifford Stein,et al.  Introduction to Algorithms, 2nd edition. , 2001 .

[286]  David L. Black,et al.  An Architecture for Differentiated Service , 1998 .

[287]  M. Herzberg,et al.  The hop-limit approach for spare-capacity assignment in survivable networks , 1995, TNET.

[288]  Gerard J. Holzmann,et al.  The SPIN Model Checker - primer and reference manual , 2003 .

[289]  Zhen Xiao,et al.  An automated approach to increasing the robustness of C libraries , 2002, Proceedings International Conference on Dependable Systems and Networks.

[290]  James P. Anderson,et al.  Information Security in a Multi-User Computer Environment , 1972, Adv. Comput..

[291]  Kishor S. Trivedi,et al.  Composite performance and availability analysis of wireless communication networks , 2001, IEEE Trans. Veh. Technol..

[292]  Boudewijn R. Haverkort,et al.  Model checking for survivability! , 2005, Second International Conference on the Quantitative Evaluation of Systems (QEST'05).

[293]  Cécile Germain,et al.  Result checking in global computing systems , 2003, ICS '03.

[294]  Jeannette M. Wing,et al.  Tools for Generating and Analyzing Attack Graphs , 2003, FMCO.

[295]  Michael Atighetchi,et al.  Adaptive cyberdefense for survival and intrusion tolerance , 2004, IEEE Internet Computing.

[296]  Sudipta Sengupta,et al.  Capacity efficient distributed routing of mesh-restored lightpaths in optical networks , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).

[297]  Yu Liu,et al.  Approximating optimal spare capacity allocation by successive survivable routing , 2005, TNET.

[298]  N. Golmie,et al.  A differentiated optical services model for WDM networks , 2000, IEEE Commun. Mag..

[299]  W.E. Falconer,et al.  Service assurance in modern telecommunications networks , 1990, IEEE Communications Magazine.

[300]  Bernhard Plattner,et al.  Scalable high speed IP routing lookups , 1997, SIGCOMM '97.

[301]  Robert E. Tarjan,et al.  Depth-First Search and Linear Graph Algorithms , 1972, SIAM J. Comput..

[302]  Kishor S. Trivedi,et al.  Performability Analysis: Measures, an Algorithm, and a Case Study , 1988, IEEE Trans. Computers.

[303]  Henrique Madeira,et al.  Generic faultloads based on software faults for dependability benchmarking , 2004, International Conference on Dependable Systems and Networks, 2004.

[304]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[305]  Wenliang Du,et al.  Testing for software vulnerability using environment perturbation , 2000, Proceeding International Conference on Dependable Systems and Networks. DSN 2000.

[306]  Ravishankar K. Iyer,et al.  An experimental study of security vulnerabilities caused by errors , 2001, 2001 International Conference on Dependable Systems and Networks.

[307]  Biswanath Mukherjee,et al.  TRAFFIC ENGINEERING FOR MULTI-LAYER NETWORKS , 2007 .

[308]  Moni Naor,et al.  Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.

[309]  Anup K. Ghosh,et al.  An approach to testing COTS software for robustness to operating system exceptions and errors , 1999, Proceedings 10th International Symposium on Software Reliability Engineering (Cat. No.PR00443).

[310]  Axel W. Krings,et al.  A Probabilistic Approach for Task and Result Certification of Large-Scale Distributed Applications in Hostile Environments , 2005, EGC.

[311]  Kishor S. Trivedi,et al.  Performance And Reliability Analysis Of Computer Systems (an Example-based Approach Using The Sharpe Software , 1997, IEEE Transactions on Reliability.

[312]  Peter Oehlert,et al.  Violating Assumptions with Fuzzing , 2005, IEEE Secur. Priv..

[313]  Tsong-Ho Wu,et al.  Fiber Network Service Survivability , 1992 .

[314]  Teresa A. Dahlberg,et al.  Survivability Analysis for Mobile Cellular Networks , 2005 .

[315]  Marc Dacier,et al.  Mining intrusion detection alarms for actionable knowledge , 2002, KDD.

[316]  A.W. Krings,et al.  Fault-Models in Wireless Communication: Towards Survivable Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[317]  Malgorzata Steinder,et al.  Increasing robustness of fault localization through analysis of lost, spurious, and positive symptoms , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[318]  Tao Wu,et al.  Attack monitoring and localization in all-optical networks , 2002, SPIE ITCom.

[319]  Fred B. Schneider,et al.  Towards Fault-Tolerant and Secure Agentry , 1997, WDAG.

[320]  Oleg Sheyner,et al.  Attack scenario graphs for computer network threat analysis and prediction , 2003, Complex.

[321]  Robbert van Renesse,et al.  Operating system support for mobile agents , 1995, Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V).

[322]  Christopher Krügel,et al.  Evaluating the impact of automated intrusion response mechanisms , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[323]  Hari Balakrishnan,et al.  Resilient overlay networks , 2001, SOSP.

[324]  J. H. Weber,et al.  A simulation study of routing and control in communications networks , 1964 .

[325]  Cynthia A. Phillips,et al.  A graph-based system for network-vulnerability analysis , 1998, NSPW '98.

[326]  Jean Arlat,et al.  Fault Injection and Dependability Evaluation of Fault-Tolerant Systems , 1993, IEEE Trans. Computers.

[327]  John McHugh,et al.  Survivable Network Analysis Method , 2000 .

[328]  Kevin A. Kwiat,et al.  Modeling the spread of active worms , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[329]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[330]  Jie Gao,et al.  Approaches to building self healing systems using dependency analysis , 2004, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507).

[331]  Fred J. Kaudel,et al.  Framework for network survivability performance , 1994, IEEE J. Sel. Areas Commun..

[332]  T. Basar,et al.  A game theoretic approach to decision and analysis in network intrusion detection , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[333]  Rami G. Melhem,et al.  Roaming honeypots for mitigating service-level denial-of-service attacks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[334]  Jiankun Hu,et al.  Intrusion Detection Based on Data Mining , 2003, ICEIS.

[335]  Richard E. Schantz,et al.  Survival by defense-enabling , 2001, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[336]  Yi-Bing Lin,et al.  Per-user checkpointing for mobility database failure restoration , 2005, IEEE Transactions on Mobile Computing.

[337]  George W Bush,et al.  The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets , 2003 .

[338]  James A. Whittaker How to Break Software , 2000 .

[339]  Svein J. Knapskog,et al.  Incorporating Attacker Behavior in Stochastic Models of Security , 2005, Security and Management.

[340]  Arie M. C. A. Koster,et al.  Demand-wise Shared Protection for Meshed Optical Networks , 2005, Journal of Network and Systems Management.

[341]  Svein J. Knapskog,et al.  A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[342]  Junfeng Yang,et al.  An empirical study of operating systems errors , 2001, SOSP.

[343]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[344]  Pradeep K. Khosla,et al.  Selecting the Right Data Distribution Scheme for a Survivable Storage System (CMU-CS-01-120) , 2001 .

[345]  Kevin R. Fall,et al.  A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.

[346]  Piet Demeester,et al.  Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS , 2004 .

[347]  Jean Arlat,et al.  MAFALDA-RT: a tool for dependability assessment of real-time systems , 2002, Proceedings International Conference on Dependable Systems and Networks.

[348]  M. L. Jones A carrier perspective on all-optical networks , 2002, IEEE/LEOS Summer Topi All-Optical Networking: Existing and Emerging Architecture and Applications/Dynamic Enablers of Next-Generation Optical Communications Systems/Fast Optical Processing in Optical.

[349]  Sheng Ma,et al.  Optimizing Probe Selection for Fault Localization , 2001, DSOM.

[350]  Bill Cheswick,et al.  Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.

[351]  Gunnar Karlsson,et al.  Techniques to reduce the IEEE 802.11b handoff time , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[352]  Jiankun Hu,et al.  A multi-layer model for anomaly intrusion detection using program sequences of system calls , 2003, The 11th IEEE International Conference on Networks, 2003. ICON2003..

[353]  Erland Jonsson,et al.  An integrated framework for security and dependability , 1998, NSPW '98.

[354]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[355]  Kishor S. Trivedi,et al.  Characterizing intrusion tolerant systems using a state transition model , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[356]  Wayne D. Grover,et al.  Shared-Risk Logical Span Groups in Span-Restorable Optical Networks: Analysis and Capacity Planning Model , 2005, Photonic Network Communications.

[357]  Kaveh Pahlavan,et al.  Handoff in hybrid mobile data networks , 2000, IEEE Wirel. Commun..

[358]  Klaus H. Ecker,et al.  Scheduling Computer and Manufacturing Processes , 2001 .

[359]  Bharat B. Madan,et al.  A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.

[360]  Joobin Choobineh,et al.  Trust in electronic commerce: definition and theoretical considerations , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.

[361]  Achim Autenrieth,et al.  Optimal configuration of p-cycles in WDM networks , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[362]  David Wright,et al.  Towards Operational Measures of Computer Security , 1993, J. Comput. Secur..

[363]  Albert G. Greenberg,et al.  Experience in black-box OSPF measurement , 2001, IMW '01.

[364]  Yi Qian,et al.  Towards Survivable and Secure Wireless Sensor Networks , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.

[365]  Mari Maeda Management and control of transparent optical networks , 1998, IEEE J. Sel. Areas Commun..

[366]  Nancy R. Mead,et al.  Survivable Network System Analysis: A Case Study , 1999, IEEE Softw..

[367]  D. Tipper,et al.  Topological design of 3G wireless backhaul networks for service assurance , 2005, DRCN 2005). Proceedings.5th International Workshop on Design of Reliable Communication Networks, 2005..

[368]  Li Zhou,et al.  Integrated access control and intrusion detection for Web Servers , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[369]  Erland Jonsson,et al.  Towards an integrated conceptual model of security and dependability , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[370]  Peter Kubat,et al.  Design of cellular networks with diversity and capacity constraints , 2000, IEEE Trans. Reliab..

[371]  Barton P. Miller,et al.  An empirical study of the reliability of UNIX utilities , 1990, Commun. ACM.

[372]  Alessandro Birolini Reliability Engineering: Theory and Practice , 1999 .

[373]  R. Larson,et al.  Linux Kernel , 2003 .

[374]  Edmund M. Clarke,et al.  Ranking Attack Graphs , 2006, RAID.

[375]  Muriel Médard,et al.  Attack Detection Methods for All-Optical Networks , 1998, NDSS.

[376]  Nick McKeown,et al.  Routing lookups in hardware at memory access speeds , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[377]  Peter G. Neumann,et al.  Experience with EMERALD to Date , 1999, Workshop on Intrusion Detection and Network Monitoring.

[378]  Tao Wu,et al.  Cross-talk attack monitoring and localization in all-optical networks , 2005, IEEE/ACM Transactions on Networking.

[379]  Arun K. Somani Survivability and Traffic Grooming in WDM Optical Networks , 2006 .

[380]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[381]  Tao Wu,et al.  Necessary and sufficient condition for k crosstalk attacks localization in all-optical networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[382]  Kishor S. Trivedi,et al.  A General Framework for Network Survivability Quantification , 2004, MMB.

[383]  David Moore,et al.  Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.

[384]  Teresa A. Dahlberg,et al.  Providing fault tolerance in wireless access networks , 2002, IEEE Commun. Mag..

[385]  Elisa Bertino,et al.  PP-trust-X: A system for privacy preserving trust negotiations , 2007, TSEC.

[386]  Myung J. Lee,et al.  Toward Secure Low Rate Wireless Personal Area Networks , 2006, IEEE Transactions on Mobile Computing.

[387]  Peng Ning,et al.  Learning attack strategies from intrusion alerts , 2003, CCS '03.

[388]  Kazutaka Murakami,et al.  Virtual path routing for survivable ATM networks , 1996, TNET.