Intrusion tolerant systems

[1]  Andrew P. Moore,et al.  TRIAD: a framework for survivability architecting , 2003, SSRS '03.

[2]  Andrew S. Tanenbaum,et al.  Distributed systems: Principles and Paradigms , 2001 .

[3]  Jingtao Yao,et al.  An Enhanced Support Vector Machine Model for Intrusion Detection , 2006, RSKT.

[4]  James E. Just,et al.  Review and analysis of synthetic diversity for breaking monocultures , 2004, WORM '04.

[5]  David Evans,et al.  A biological programming model for self-healing , 2003, SSRS '03.

[6]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[7]  James C. Reynolds,et al.  Continual repair for windows using the event log , 2003, SSRS '03.

[8]  Peng Liu,et al.  Incentive-based modeling and inference of attacker intent, objectives, and strategies , 2003, CCS '03.

[9]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[10]  Marc Dacier,et al.  MAFTIA (Malicious− and Accidental− Fault Tolerance for Internet Applications , 2001 .

[11]  Jens Tölle,et al.  A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs , 2006, DIMVA.

[12]  Rong Wang Intrusion Tolerant Systems Characterization and Acceptance Monitor Design , 2001 .

[13]  Michael J. Fischer,et al.  The Consensus Problem in Unreliable Distributed Systems (A Brief Survey) , 1983, FCT.

[14]  Fred B. Schneider,et al.  COCA: a secure distributed online certification authority , 2002 .

[15]  Kotagiri Ramamohanarao,et al.  Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.

[16]  Jingtao Yao,et al.  A study on fuzzy intrusion detection , 2005, SPIE Defense + Commercial Sensing.

[17]  Paulo Veríssimo Intrusion Tolerance: Concepts and Design Principles. A Tutorial , 2002 .