A Distributed Monitoring System for Enhancing Security and Dependability at Architectural Level
暂无分享,去创建一个
[1] Udo W. Pooch,et al. Cooperating security managers: a peer-based intrusion detection system , 1996, IEEE Netw..
[2] Carla Marceau,et al. Intrusion detection for distributed applications , 1999, CACM.
[3] Koushik Sen,et al. Efficient decentralized monitoring of safety in distributed systems , 2004, Proceedings. 26th International Conference on Software Engineering.
[4] Giovanni Vigna,et al. NetSTAT: A Network-based Intrusion Detection System , 1999, J. Comput. Secur..
[5] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[6] Gunar E. Liepins,et al. Detection of anomalous computer session activity , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[7] Erland Jonsson,et al. A Map of Security Risks Associated wuth Using COTS , 1998, Computer.
[8] Ivica Crnkovic,et al. Building Reliable Component-Based Software Systems , 2002 .
[9] Rogério de Lemos,et al. Architectural Mismatch Tolerance , 2002, WADS.
[10] Paola Inverardi,et al. Synthesis of correct and distributed adaptors for component-based systems: an automatic approach , 2005, ASE '05.
[11] Paola Inverardi,et al. A Distributed Intrusion Detection Approach for Secure Software Architecture , 2005, EWSA.
[12] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[13] Giovanni Vigna,et al. STATL: An Attack Language for State-Based Intrusion Detection , 2002, J. Comput. Secur..
[14] Fred B. Schneider,et al. Enforceable security policies , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[15] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[16] Julie A. McCann,et al. Connectionless probabilistic (CoP) routing: an efficient protocol for mobile wireless ad-hoc sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..
[17] Paola Inverardi,et al. Distributed IDSs for enhancing Security in Mobile Wireless Sensor Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[18] Biswanath Mukherjee,et al. DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype , 1997 .
[19] Karl N. Levitt,et al. Execution monitoring of security-critical programs in distributed systems: a specification-based approach , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[20] Ana R. Cavalli,et al. An EFSM-Based Intrusion Detection System for Ad Hoc Networks , 2005, ATVA.
[21] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[22] 하수철,et al. [서평]「Component Software」 - Beyond Object-Oriented Programming - , 2000 .
[23] Ann Q. Gates,et al. A taxonomy and catalog of runtime software-fault monitoring tools , 2004, IEEE Transactions on Software Engineering.
[24] Harold S. Javitz,et al. The NIDES Statistical Component Description and Justification , 1994 .