Probabilistic treatment of service assurance in distributed information systems
暂无分享,去创建一个
[1] William K. McQuay,et al. Joint battlespace infosphere applications using collaborative enterprise environment technology , 2005, SPIE Defense + Commercial Sensing.
[2] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[3] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[4] Kaliappa Nadar Ravindran,et al. Reconfigurable Peer-to-Peer Connectivity Overlays for Information Assurance Applications , 2009, 2009 IEEE International Conference on Communications.
[5] Kaliappa Nadar Ravindran. Managing Robustness of Distributed Applications Under Uncertainties: An Information Assurance Perspective , 2011, CSIIRW '10.
[6] Chin-Tser Huang,et al. Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[7] Ioannis Lambadaris,et al. Current Trends and Advances in Information Assurance Metrics , 2004, Conference on Privacy, Security and Trust.
[8] Shahram Ghandeharizadeh,et al. NAM: A Network Adaptable Middleware to Enhance Response Time of Web Services , 2005, Int. J. Web Serv. Res..
[9] Kaliappa Ravindran,et al. Model-based control of device replication for trusted data collection , 2014, 2014 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES).
[10] Gerhard J. Woeginger,et al. Online Algorithms , 1998, Lecture Notes in Computer Science.
[11] Pramod K. Varshney,et al. Distributed Detection and Data Fusion , 1996 .
[12] Ehab Al-Shaer,et al. Moving Target Defense for Hardening the Security of the Power System State Estimation , 2014, MTD '14.
[13] Kaliappa Nadar Ravindran,et al. Management of QoS-oriented Adaptation in Automobile Cruise Control Systems , 2017, 2017 IEEE International Conference on Autonomic Computing (ICAC).
[15] Marcus Brunner,et al. Probabilistic decentralized network management , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management.
[16] Steven Drager,et al. Assessment of QoS adaptation and cyber-defense mechanisms in networked systems , 2017, 2017 IEEE Conference on Dependable and Secure Computing.
[17] S. Bush. Complexity and Vulnerability Analysis (Extended Abstract) , 2003 .
[18] Michael R. Clarkson,et al. Quantification of integrity† , 2014, Mathematical Structures in Computer Science.
[19] Richard Y. Wang,et al. Data quality assessment , 2002, CACM.
[20] Jun Wu,et al. Service Abstractions With Fault Virtualization for Distributed Network Infrastructures , 2013, 2013 IEEE/ACM 17th International Symposium on Distributed Simulation and Real Time Applications.
[21] Kaliappa Nadar Ravindran. Probabilistic Fault-tolerance of Distributed Services: A Paradigm for Dependable Applications , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.