• Nenhum resultado encontrado

[PDF] Top 20 On the Resilience of Intrusion-Tolerant Distributed Systems

Has 10000 "On the Resilience of Intrusion-Tolerant Distributed Systems" found on our website. Below are the top 20 most common "On the Resilience of Intrusion-Tolerant Distributed Systems".

On the Resilience of Intrusion-Tolerant Distributed Systems

On the Resilience of Intrusion-Tolerant Distributed Systems

... which distributed systems resilience may be evaluated – ...node-exhaustion-safe intrusion-tolerant distributed system is a sys- tem that assuredly does not suffer more than ... See full document

33

Intrusion-Tolerant Middleware: the MAFTIA approach

Intrusion-Tolerant Middleware: the MAFTIA approach

... aspect of the TTCB strategy is time. The TTCB supports timed behavior in an intrusion-resilient ...timed systems are fragile in that timing assumptions can be manipulated by ... See full document

47

RESEARCH ON SECURITY PROTOCOL FOR COLLABORATING MOBILE AGENTS IN NETWORK INTRUSION DETECTION SYSTEMS

RESEARCH ON SECURITY PROTOCOL FOR COLLABORATING MOBILE AGENTS IN NETWORK INTRUSION DETECTION SYSTEMS

... Despite the popularity of mobile agents in academic and commercial arena, the security issues associated with them have hindered their adoption on large scale distributed ...overcome ... See full document

10

Intrusion Tolerant Routing with Data Consensus in Wireless Sensor Networks

Intrusion Tolerant Routing with Data Consensus in Wireless Sensor Networks

... Although intrusion and fault tolerance has been extensively studied in the context of wired networks, ad-hoc wireless sensor networks introduce a combination of threats that are not usually ... See full document

144

On-line monitoring of multi-area power systems in distributed environment

On-line monitoring of multi-area power systems in distributed environment

... volume of data where a new approach is needed to enable the power system data to be processed, analyzed and interpreted by different power system ...number of exceptions implemented on ... See full document

13

Intrusion-Tolerant Protection for Critical Infrastructures

Intrusion-Tolerant Protection for Critical Infrastructures

... like the Power Grid are essentially physical processes controlled by computers con- nected by ...impact. The paper describes a new construct for the protection of these infrastructures, based ... See full document

20

Secured UAV based on multi-agent systems and embedded Intrusion Detection and Prevention Systems

Secured UAV based on multi-agent systems and embedded Intrusion Detection and Prevention Systems

... area of research and in full effervescence with more and more amateur and academic ...to the military, these vehicles are way to be used in many other ...within of this type of technology. ... See full document

5

Intrusion-Tolerant Architectures: Concepts and Design

Intrusion-Tolerant Architectures: Concepts and Design

... body of research on distributed computing architectures, methodologies and algorithms, both in the fields of dependability and fault tol- erance, and in security and information ... See full document

47

A fault - and intrusion - tolerant architecture for EDP Distribuição SCADA system

A fault - and intrusion - tolerant architecture for EDP Distribuição SCADA system

... time, the redundant SCADA servers were solely responsible for the monitoring and control of the power grid, which made it the only critical server whose operation could not ...recently,  ... See full document

116

Fault-tolerant Stochastic Distributed Systems

Fault-tolerant Stochastic Distributed Systems

... consider the two following scenarios: (i) randomized gossip algorithms in wireless networks, where each agent becomes active at randomly chosen times, transmitting its data to a single neighbor; (ii) broadcast ... See full document

238

Cheap Intrusion-Tolerant Protection for CRUTIAL Things

Cheap Intrusion-Tolerant Protection for CRUTIAL Things

... like the power grid are essentially physical processes con- trolled by computers connected by ...impact. The re- port describes a new construct for the protection of these infrastructures, ... See full document

34

Intrusion Detection Systems Based On Packet Sniffing

Intrusion Detection Systems Based On Packet Sniffing

... for the messages from other ...are distributed systems that, in spite of the simplicity of their individuals, present a highly structured social ...result of this ... See full document

4

Intrusion Tolerant Routing Protocols for Wireless Sensor Networks

Intrusion Tolerant Routing Protocols for Wireless Sensor Networks

... On the network layer, most of the routing protocols are not designed to be intrusion ...as the three studied on this chapter that do provide some mechanisms to cope with ... See full document

114

On the Effects of Diversity on Intrusion Tolerance

On the Effects of Diversity on Intrusion Tolerance

... gains of intrusion-tolerant systems are di- rectly dependent on the assumption that system components fail independently of one ...another. The coverage of ... See full document

13

Diverse Intrusion-tolerant Systems

Diverse Intrusion-tolerant Systems

... be the next configuration. In the centralized version of the system, it is simple to select random ...among the replicas without prior knowledge of anyone and guaranteeing that ... See full document

167

How Practical Are Intrusion-Tolerant Distributed Systems?

How Practical Are Intrusion-Tolerant Distributed Systems?

... points of failure, with respect both to confidentiality (when a secret or private key is disclosed to an unauthorized party) and to integrity (when a secret or private key is destroyed without proper autho- ... See full document

22

How dependable are distributed f fault/intrusion-tolerant systems?

How dependable are distributed f fault/intrusion-tolerant systems?

... not the only) solution to the problem of ensuring permanently correct (PC) operation of proactive recovery ...systems. The solution is based on the concept ... See full document

17

REVIEW OF CHECKPOINTING ALGORITHMS IN DISTRIBUTED SYSTEMS

REVIEW OF CHECKPOINTING ALGORITHMS IN DISTRIBUTED SYSTEMS

... A distributed system is a collection of computers that are spatially separated and do not share a common ...memory. The processes executing on these computers communicate with one another by ... See full document

9

Diversity management in intrusion tolerant systems

Diversity management in intrusion tolerant systems

... One of the key benefits of using intrusion-tolerant systems is the possibility of ensur- ing correct behavior in the presence of attacks and ... See full document

74

Analyzing Audit Trails in a Distributed and Hybrid Intrusion Detection Platform

Analyzing Audit Trails in a Distributed and Hybrid Intrusion Detection Platform

... form of denial-of-service in which the target is hit with a barrage of TCP SYN requests, in an attempt to exhaust its resources and im- pair its ability to answer legitimate ...because ... See full document

131

Show all 10000 documents...