A Survey on Intrusion-Tolerant System
暂无分享,去创建一个
Hyunsoo Yoon | Yonggon Kim | Ohmin Kwon | Jungmin Lim | Yongjoo Shin | Dongyoung Koo | Seondong Heo | Pyeong Kim | H. Yoon | Dongyoung Koo | Ohmin Kwon | Yongjoo Shin | Seondong Heo | Pyeong Kim | Jungmin Lim | Yonggon Kim
[1] Yaning Liu,et al. Anomaly Detection in Medical Wireless Sensor Networks , 2013, J. Comput. Sci. Eng..
[2] Hyunsoo Yoon,et al. A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology , 2013, The Journal of Supercomputing.
[3] 김용기,et al. 효율적 자원 변환을 통한 고유의 침입감내 시스템 설계 , 2012 .
[4] Hyunsoo Yoon,et al. The design of adaptive intrusion tolerant system(ITS) based on historical data , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[5] Kwang-Cheng Chen,et al. Machine-to-Machine Communications for Healthcare , 2012, J. Comput. Sci. Eng..
[6] 김희영,et al. A Design of a Novel Intrusion Tolerant System Using Virtual Machine Image Analysis and Secure Exposure Policy , 2012 .
[7] Hyunsoo Yoon,et al. A Novel Intrusion Tolerant System Based on Adaptive Recovery Scheme (ARS) , 2012, ICITCS.
[8] Chanik Park,et al. Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment , 2011, J. Comput. Sci. Eng..
[9] Hala H. Zayed,et al. Intrusion Detection: Supervised Machine Learning , 2011, J. Comput. Sci. Eng..
[10] Greeshma Varghese,et al. Analysis of intrusion-tolerant architectures for Web Servers , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.
[11] 서정연,et al. Journal of Computing Science and Engineering(JCSE)의 국제화 작업 , 2010 .
[12] Arun K. Sood,et al. An Intrusion Tolerance Approach to Enhance Single Sign on Server Protection , 2010, 2010 Third International Conference on Dependability.
[13] Arun K. Sood,et al. Realizing S-Reliability for services via recovery-driven intrusion tolerance mechanism , 2010, 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W).
[14] Arun K. Sood,et al. Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT) , 2009, 2009 Second International Conference on Dependability.
[15] Vincent Nicomette,et al. The Design of a Generic Intrusion-Tolerant Architecture for Web Servers , 2009, IEEE Transactions on Dependable and Secure Computing.
[16] Arun K. Sood,et al. Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES) , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[17] Franklin Webber,et al. The DPASA Survivable JBI — A High-Water Mark in Intrusion-Tolerant Systems , 2007 .
[18] Paulo Veríssimo,et al. Intrusion-tolerant middleware: the road to automatic security , 2006, IEEE Security & Privacy.
[19] Arun K. Sood,et al. Incorruptible system self-cleansing for intrusion tolerance , 2006, 2006 IEEE International Performance Computing and Communications Conference.
[20] Y. Huang. Self-Cleansing Systems for Intrusion Containment , 2006 .
[21] Michael Atighetchi,et al. Survivability architecture of a mission critical system: the DPASA example , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[22] Feiyi Wang,et al. SITAR: a scalable intrusion-tolerant architecture for distributed services , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[23] Karl N. Levitt,et al. The design and implementation of an intrusion tolerant system , 2002, Proceedings International Conference on Dependable Systems and Networks.
[24] Magnus Almgren,et al. An Architecture for an Adaptive Intrusion-Tolerant Server , 2002, Security Protocols Workshop.
[25] Michael Gertz,et al. The Willow Architecture: Comprehensive Survivability for Large-Scale Distributed Applications , 2001 .
[26] William H. Sanders,et al. Intrusion Tolerance Approaches in ITUA , 2001 .