A Distributed Monitoring System for Enhancing Security and Dependability at Architectural Level

A method for preparing a resinous condensation product of an allylated phenol and an ethoxyline resin comprising reacting an allylated phenol with an ethoxyline resin in the presence of an acid catalyst and a compound selected from certain ketones and esters.

[1]  Udo W. Pooch,et al.  Cooperating security managers: a peer-based intrusion detection system , 1996, IEEE Netw..

[2]  Carla Marceau,et al.  Intrusion detection for distributed applications , 1999, CACM.

[3]  Koushik Sen,et al.  Efficient decentralized monitoring of safety in distributed systems , 2004, Proceedings. 26th International Conference on Software Engineering.

[4]  Giovanni Vigna,et al.  NetSTAT: A Network-based Intrusion Detection System , 1999, J. Comput. Secur..

[5]  Peter G. Neumann,et al.  EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.

[6]  Gunar E. Liepins,et al.  Detection of anomalous computer session activity , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[7]  Erland Jonsson,et al.  A Map of Security Risks Associated wuth Using COTS , 1998, Computer.

[8]  Ivica Crnkovic,et al.  Building Reliable Component-Based Software Systems , 2002 .

[9]  Rogério de Lemos,et al.  Architectural Mismatch Tolerance , 2002, WADS.

[10]  Paola Inverardi,et al.  Synthesis of correct and distributed adaptors for component-based systems: an automatic approach , 2005, ASE '05.

[11]  Paola Inverardi,et al.  A Distributed Intrusion Detection Approach for Secure Software Architecture , 2005, EWSA.

[12]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[13]  Giovanni Vigna,et al.  STATL: An Attack Language for State-Based Intrusion Detection , 2002, J. Comput. Secur..

[14]  Fred B. Schneider,et al.  Enforceable security policies , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[15]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[16]  Julie A. McCann,et al.  Connectionless probabilistic (CoP) routing: an efficient protocol for mobile wireless ad-hoc sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[17]  Paola Inverardi,et al.  Distributed IDSs for enhancing Security in Mobile Wireless Sensor Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[18]  Biswanath Mukherjee,et al.  DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype , 1997 .

[19]  Karl N. Levitt,et al.  Execution monitoring of security-critical programs in distributed systems: a specification-based approach , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[20]  Ana R. Cavalli,et al.  An EFSM-Based Intrusion Detection System for Ad Hoc Networks , 2005, ATVA.

[21]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[22]  하수철,et al.  [서평]「Component Software」 - Beyond Object-Oriented Programming - , 2000 .

[23]  Ann Q. Gates,et al.  A taxonomy and catalog of runtime software-fault monitoring tools , 2004, IEEE Transactions on Software Engineering.

[24]  Harold S. Javitz,et al.  The NIDES Statistical Component Description and Justification , 1994 .