Self-Adaptation Applied to MQTT via a Generic Autonomic Management Framework
暂无分享,去创建一个
[1] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[2] Vicente Julián,et al. RT-MOVICAB-IDS: Addressing real-time intrusion detection , 2013, Future Gener. Comput. Syst..
[3] Joni da Silva Fraga,et al. Octopus-IIDS: An anomaly based intelligent intrusion detection system , 2010, The IEEE symposium on Computers and Communications.
[4] Danny Weyns,et al. ActivFORMS: active formal models for self-adaptation , 2014, SEAMS 2014.
[5] Henry Muccini,et al. Self-Adaptation for Cyber-Physical Systems: A Systematic Literature Review , 2016, 2016 IEEE/ACM 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS).
[6] Danny Weyns,et al. MAPE-K Formal Templates to Rigorously Design Behaviors for Self-Adaptive Systems , 2015, ACM Trans. Auton. Adapt. Syst..
[7] Paulo Leitão,et al. Industrial automation based on cyber-physical systems technologies: Prototype implementations and challenges , 2016, Comput. Ind..
[8] Alan Dearle,et al. Self-Adaptation Applied to Peer-Set Maintenance in Chord via a Generic Autonomic Management Framework , 2010, 2010 Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshop.
[9] Jeffrey O. Kephart,et al. The Vision of Autonomic Computing , 2003, Computer.
[10] Alan Dearle,et al. Autonomic management of client concurrency in a distributed storage service , 2011, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops.
[11] Ralf Neubert,et al. Architecture Alignment and Interoperability , 2017 .
[12] R.S.H. Piggin. Development of industrial cyber security standards: IEC 62443 for SCADA and Industrial Control System security , 2013 .
[13] Roberto Tronci,et al. HMMPayl: An intrusion detection system based on Hidden Markov Models , 2011, Comput. Secur..
[14] Steffen Becker,et al. Model-driven performance engineering of self-adaptive systems: a survey , 2012, QoSA '12.
[15] Florian Skopik,et al. Cyber situational awareness through network anomaly detection: state of the art and new approaches , 2015, e & i Elektrotechnik und Informationstechnik.
[16] Hausi A. Müller,et al. A framework for evaluating quality-driven self-adaptive software systems , 2011, SEAMS '11.
[17] Ani Bicaku,et al. Towards flexible and secure end-to-end communication in industry 4.0 , 2017, 2017 IEEE 15th International Conference on Industrial Informatics (INDIN).
[18] Georg Disterer,et al. ISO/IEC 27000, 27001 and 27002 for Information Security Management , 2013 .
[19] Henry Muccini,et al. Self-Adaptation for Cyber-Physical Systems: A Systematic Literature Review , 2016, 2016 IEEE/ACM 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS).
[20] Danny Weyns,et al. A survey of formal methods in self-adaptive systems , 2012, C3S2E '12.
[21] Paolo Arcaini,et al. Modeling and Analyzing MAPE-K Feedback Loops for Self-Adaptation , 2015, 2015 IEEE/ACM 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems.
[22] Vincenzo Grassi,et al. Qos-driven runtime adaptation of service oriented architectures , 2009, ESEC/SIGSOFT FSE.
[23] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.