Logic testing and design for testability
Logic testing and design for testability
Graph-Based Algorithms for Boolean Function Manipulation
IEEE Transactions on Computers
An experimental evaluation of the assumption of independence in multiversion programming
IEEE Transactions on Software Engineering
Performability Analysis: Measures, an Algorithm, and a Case Study
IEEE Transactions on Computers - Fault-Tolerant Computing
Software quality engineering: a total technical and management approach
Software quality engineering: a total technical and management approach
Sequential Fault Occurrence and Reconfiguration in System Level Diagnosis
IEEE Transactions on Computers
An empirical study of the reliability of UNIX utilities
Communications of the ACM
Scheduling multiprocessor tasks on three dedicated processors
Information Processing Letters
Network flows: theory, algorithms, and applications
Network flows: theory, algorithms, and applications
A taxonomy of computer program security flaws
ACM Computing Surveys (CSUR)
FERRARI: A Flexible Software-Based Fault and Error Injection System
IEEE Transactions on Computers - Special issue on fault-tolerant computing
The hop-limit approach for spare-capacity assignment in survivable networks
IEEE/ACM Transactions on Networking (TON)
Role-Based Access Control Models
Computer
Virtual path routing for survivable ATM networks
IEEE/ACM Transactions on Networking (TON)
Performance and reliability analysis of computer systems: an example-based approach using the SHARPE software package
A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior
IEEE Transactions on Software Engineering
Measuring Software Dependability by Robustness Benchmarking
IEEE Transactions on Software Engineering
Scalable high speed IP routing lookups
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
ATM transport and network integrity
ATM transport and network integrity
A coding approach to event correlation
Proceedings of the fourth international symposium on Integrated network management IV
An integrated framework for security and dependability
Proceedings of the 1998 workshop on New security paradigms
A graph-based system for network-vulnerability analysis
Proceedings of the 1998 workshop on New security paradigms
Packet classification using tuple space search
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security
IEEE Transactions on Software Engineering
NetSTAT: a network-based intrusion detection system
Journal of Computer Security
Exploiting Omissive Faults in Synchronous Approximate Agreement
IEEE Transactions on Computers
The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
Byzantine generals in action: implementing fail-stop processors
ACM Transactions on Computer Systems (TOCS)
Password authentication with insecure communication
Communications of the ACM
A lattice model of secure information flow
Communications of the ACM
Protection in operating systems
Communications of the ACM
A requires/provides model for computer attacks
Proceedings of the 2000 workshop on New security paradigms
Dictionary of computer science engineering and technology
Dictionary of computer science engineering and technology
Survivability analysis of networked systems
ICSE '01 Proceedings of the 23rd International Conference on Software Engineering
Optical networks: a practical perspective
Optical networks: a practical perspective
Probability and statistics with reliability, queuing and computer science applications
Probability and statistics with reliability, queuing and computer science applications
An empirical study of operating systems errors
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
The SLAM project: debugging system software via static analysis
POPL '02 Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Experience in black-box OSPF measurement
IMW '01 Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement
Dependability of COTS Microkernel-Based Systems
IEEE Transactions on Computers - Special issue on fault-tolerant embedded systems
Intrusion Detection
Survivable Networks: Algorithms for Diverse Routing
Survivable Networks: Algorithms for Diverse Routing
Software Fault Tolerance
Fiber Network Service Survivability
Fiber Network Service Survivability
Dynamic Routing in Telecommunications Networks
Dynamic Routing in Telecommunications Networks
Testing Computer Software, Second Edition
Testing Computer Software, Second Edition
Network Intrusion Detection: An Analyst's Handbook
Network Intrusion Detection: An Analyst's Handbook
Scheduling Computer and Manufacturing Processes
Scheduling Computer and Manufacturing Processes
Principles of Wireless Networks: A Unified Approach
Principles of Wireless Networks: A Unified Approach
Modelling with Generalized Stochastic Petri Nets
Modelling with Generalized Stochastic Petri Nets
Sabotage-tolerance mechanisms for volunteer computing systems
Future Generation Computer Systems - Best papers from symp. on cluster computing and the grid (CCGRID 2001)
A survey of rollback-recovery protocols in message-passing systems
ACM Computing Surveys (CSUR)
Survivable mobile wireless networks: issues, challenges, and research directions
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
MSWiM '02 Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems
Dependability: Basic Concepts and Terminology
Dependability: Basic Concepts and Terminology
Unified Methods for VLSI Simulation and Test Generation
Unified Methods for VLSI Simulation and Test Generation
Optical Networks: Architecture and Survivability
Optical Networks: Architecture and Survivability
Introduction to Algorithms
Design and implementation of the idemix anonymous credential system
Proceedings of the 9th ACM conference on Computer and communications security
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Scalable, graph-based network vulnerability analysis
Proceedings of the 9th ACM conference on Computer and communications security
Constructing attack scenarios through correlation of intrusion alerts
Proceedings of the 9th ACM conference on Computer and communications security
Designing Least-Cost Survivable Wireless Backhaul Networks
Journal of Heuristics
QoS Path Monitoring for Multicast Networks
Journal of Network and Systems Management
Yemanja—A Layered Fault Localization System for Multi-Domain Computing Utilities
Journal of Network and Systems Management
Toward cost-sensitive modeling for intrusion detection and response
Journal of Computer Security
STATL: an attack language for state-based intrusion detection
Journal of Computer Security
Practical automated detection of stealthy portscans
Journal of Computer Security
Model-based analysis of configuration vulnerabilities
Journal of Computer Security
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Securing XML Documents with Author-X
IEEE Internet Computing
Fault Injection Techniques and Tools
Computer
Portable and Fault-Tolerant Software Systems
IEEE Micro
Survivable Network System Analysis: A Case Study
IEEE Software
Fault Injection and Dependability Evaluation of Fault-Tolerant Systems
IEEE Transactions on Computers
Consensus With Dual Failure Modes
IEEE Transactions on Parallel and Distributed Systems
Xception: A Technique for the Experimental Evaluation of Dependability in Modern Computers
IEEE Transactions on Software Engineering
Analysis of link failures in an IP backbone
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Code-Red: a case study on the spread and victims of an internet worm
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Building Survivable Services Using Redundancy and Adaptation
IEEE Transactions on Computers
CoCheck: Checkpointing and Process Migration for MPI
IPPS '96 Proceedings of the 10th International Parallel Processing Symposium
LAMBDA: A Language to Model a Database for Detection of Attacks
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Probabilistic Alert Correlation
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Aggregation and Correlation of Intrusion-Detection Alerts
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Autonomic Response to Distributed Denial of Service Attacks
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Towards Fault-Tolerant and Secure Agentry
WDAG '97 Proceedings of the 11th International Workshop on Distributed Algorithms
Building Software Recovery Assertions from a Fault Injection-based Propagation Analysis
COMPSAC '97 Proceedings of the 21st International Computer Software and Applications Conference
Weaknesses in the Key Scheduling Algorithm of RC4
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Revocation and Tracing Schemes for Stateless Receivers
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Experience with EMERALD to Date
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
Reliability Testing of Applications on Windows NT
DSN '00 Proceedings of the 2000 International Conference on Dependable Systems and Networks (formerly FTCS-30 and DCCA-8)
Testing for Software Vulnerability Using Environment Perturbation
DSN '00 Proceedings of the 2000 International Conference on Dependable Systems and Networks (formerly FTCS-30 and DCCA-8)
Survivability Analysis of Network Specifications
DSN '00 Proceedings of the 2000 International Conference on Dependable Systems and Networks (formerly FTCS-30 and DCCA-8)
Performance Evaluation of Exception Handling in I/O Libraries
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
Distributing Trust on the Internet
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
An Experimental Study of Security Vulnerabilities Caused by Errors
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
An Automated Approach to Increasing the Robustness of C Libraries
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
MAFALDA-RT: A Tool for Dependability Assassment of Real-Time Systems
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
An Experimental Evaluation of the REE SIFT Environment for Spaceborne Applications
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
Modeling and Quantification of Security Attributes of Software Systems
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
Experimental Evaluation of a COTS System for Space Application
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
A geographic perspective on commercial internet survivability
Telematics and Informatics
Mining intrusion detection alarms for actionable knowledge
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
Internet intrusions: global characteristics and prevalence
SIGMETRICS '03 Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Result checking in global computing systems
ICS '03 Proceedings of the 17th annual international conference on Supercomputing
Security agility in response to intrusion detection
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Evaluating the Impact of Automated Intrusion Response Mechanisms
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
The Test Vector Problem and Limitations to Evolving Digital Circuits
EH '00 Proceedings of the 2nd NASA/DoD workshop on Evolvable Hardware
Two Formal Analys s of Attack Graphs
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
An approach towards benchmarking of fault-tolerant commercial systems
FTCS '96 Proceedings of the The Twenty-Sixth Annual International Symposium on Fault-Tolerant Computing (FTCS '96)
Comparing the Robustness of POSIX Operating Systems
FTCS '99 Proceedings of the Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing
Wrapping Windows NT Software for Robustness
FTCS '99 Proceedings of the Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing
Operating system support for mobile agents
HOTOS '95 Proceedings of the Fifth Workshop on Hot Topics in Operating Systems (HotOS-V)
Building dependable COTS microkernel-based systems using MAFALDA
PRDC '00 Proceedings of the 2000 Pacific Rim International Symposium on Dependable Computing
Analysis of the Effects of Real and Injected Software Faults
PRDC '02 Proceedings of the 2002 Pacific Rim International Symposium on Dependable Computing
Automated Generation and Analysis of Attack Graphs
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Alert Correlation in a Cooperative Intrusion Detection Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Comparing Operating Systems Using Robustness Benchmarks
SRDS '97 Proceedings of the 16th Symposium on Reliable Distributed Systems
A Fault-Tolerant Protocol for Providing the Exactly-Once Property of Mobile Agents
SRDS '98 Proceedings of the The 17th IEEE Symposium on Reliable Distributed Systems
Integrated Access Control and Intrusion Detection for Web Servers
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Testing the Robustness of Windows NT Software
ISSRE '98 Proceedings of the The Ninth International Symposium on Software Reliability Engineering
An Approach to Testing COTS Software for Robustness to Operating System Exceptions and Errors
ISSRE '99 Proceedings of the 10th International Symposium on Software Reliability Engineering
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Firewalls and Internet Security: Repelling the Wily Hacker
Firewalls and Internet Security: Repelling the Wily Hacker
A delay-tolerant network architecture for challenged internets
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
NAP: Practical Fault-Tolerance for Itinerant Computations
NAP: Practical Fault-Tolerance for Itinerant Computations
Managing Alerts in a Multi-Intrusion Detection Environment
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Measuring Robustness of a Fault-Tolerant Aerospace System
FTCS '95 Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
Trust in Electronic Commerce: Definition and Theoretical Considerations
HICSS '98 Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences-Volume 4 - Volume 4
Using Model Checking to Analyze Network Vulnerabilities
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Adapting Query Optimization Techniques for Efficient Intrusion Alert Correlation
Adapting Query Optimization Techniques for Efficient Intrusion Alert Correlation
UCAN: a unified cellular and ad-hoc network architecture
Proceedings of the 9th annual international conference on Mobile computing and networking
Improving the reliability of commodity operating systems
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Proceedings of the 10th ACM conference on Computer and communications security
Learning attack strategies from intrusion alerts
Proceedings of the 10th ACM conference on Computer and communications security
Sketch-based change detection: methods, evaluation, and applications
Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Agent Survivability: An Application for Strong andWeak Chain Constrained Scheduling
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 9 - Volume 9
Distributed Management Architecture for Cooperative Detection and Reaction to DDoS Attacks
Journal of Network and Systems Management
Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS
Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS
EPIC: Profiling the Propagation and Effect of Data Errors in Software
IEEE Transactions on Computers
Roaming Honeypots for Mitigating Service-Level Denial-of-Service Attacks
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
The Art of Software Testing
Scheduling Algorithms
Routing, Flow, and Capacity Design in Communication and Computer Networks
Routing, Flow, and Capacity Design in Communication and Computer Networks
Network Security Assessment
A method for modeling and quantifying the security attributes of intrusion tolerant systems
Performance Evaluation - Dependable systems and networks-performance and dependability symposium (DSN-PDS) 2002: Selected papers
Merging paradigms of survivability and security: stochastic faults and designed faults
Proceedings of the 2003 workshop on New security paradigms
DDoS attacks and defense mechanisms: classification and state-of-the-art
Computer Networks: The International Journal of Computer and Telecommunications Networking
Improving the latency of 802.11 hand-offs using neighbor graphs
Proceedings of the 2nd international conference on Mobile systems, applications, and services
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
Trust-X: A Peer-to-Peer Framework for Trust Establishment
IEEE Transactions on Knowledge and Data Engineering
Attack scenario graphs for computer network threat analysis and prediction
Complexity - Special issue: Resilient and adaptive defense of computing networks
Autonomic defense: thwarting automated attacks via real-time feedback control
Complexity - Special issue: Resilient and adaptive defense of computing networks
Flow sampling under hard resource constraints
Proceedings of the joint international conference on Measurement and modeling of computer systems
Generic Faultloads Based on Software Faults for Dependability Benchmarking
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Benchmarking The Dependability of Windows NT4, 2000 and XP
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Characterization of the Impact of Faulty Drivers on the Robustness of the Linux Kernel
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Error Sensitivity of the Linux Kernel Executing on PowerPC G4 and Pentium 4 Processors
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Security for wireless sensor networks
Wireless sensor networks
Security for wireless sensor networks
Wireless sensor networks
Probabilistic fault diagnosis in communication systems through incremental hypothesis updating
Computer Networks: The International Journal of Computer and Telecommunications Networking
Scenario graphs and attack graphs
Scenario graphs and attack graphs
The Tao Of Network Security Monitoring: Beyond Intrusion Detection
The Tao Of Network Security Monitoring: Beyond Intrusion Detection
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
Model-Based Evaluation: From Dependability to Security
IEEE Transactions on Dependable and Secure Computing
On scalable attack detection in the network
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Reversible sketches for efficient and accurate change detection over network data streams
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Adaptive Cyberdefense for Survival and Intrusion Tolerance
IEEE Internet Computing
Survivability Analysis of Telephone Access Network
ISSRE '04 Proceedings of the 15th International Symposium on Software Reliability Engineering
Security analysis of SITAR intrusion tolerance system
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
A Comprehensive Approach to Intrusion Detection Alert Correlation
IEEE Transactions on Dependable and Secure Computing
Alert Correlation through Triggering Events and Common Resources
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Snort - Lightweight Intrusion Detection for Networks
LISA '99 Proceedings of the 13th USENIX conference on System administration
A key-chain-based keying scheme for many-to-many secure group communication
ACM Transactions on Information and System Security (TISSEC)
Per-User Checkpointing for Mobility Database Failure Restoration
IEEE Transactions on Mobile Computing
IEEE/ACM Transactions on Networking (TON)
Approximating optimal spare capacity allocation by successive survivable routing
IEEE/ACM Transactions on Networking (TON)
Violating Assumptions with Fuzzing
IEEE Security and Privacy
Using model checking to debug device firmware
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
GEO-RBAC: a spatially aware RBAC
Proceedings of the tenth ACM symposium on Access control models and technologies
ACM Transactions on Information and System Security (TISSEC)
Penetration Testing and Cisco Network Defense
Penetration Testing and Cisco Network Defense
Survivability and Traffic Grooming in WDM Optical Networks
Survivability and Traffic Grooming in WDM Optical Networks
Error Propagation Profiling of Operating Systems
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
Towards a Theory of Insider Threat Assessment
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
Implementing Trustworthy Services Using Replicated State Machines
IEEE Security and Privacy
Benchmarking the Dependability of Windows and Linux Using PostMark™ Workloads
ISSRE '05 Proceedings of the 16th IEEE International Symposium on Software Reliability Engineering
Model Checking for Survivability
QEST '05 Proceedings of the Second International Conference on the Quantitative Evaluation of Systems
Cross-talk attack monitoring and localization in all-optical networks
IEEE/ACM Transactions on Networking (TON)
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach
IEEE Transactions on Dependable and Secure Computing
Using Stochastic Game Theory to Compute the Expected Behavior of Attackers
SAINT-W '05 Proceedings of the 2005 Symposium on Applications and the Internet Workshops
Towards a Stochastic Model for Integrated Security and Dependability Evaluation
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Towards an Integrated Conceptual Model of Security and Dependability
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!
Proceedings of the eleventh ACM symposium on Access control models and technologies
A Novel Quantitative Analysis Method for Network Survivability
IMSCCS '06 Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences - Volume 2 (IMSCCS'06) - Volume 02
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation
An empirical study of the robustness of MacOS applications using random testing
Proceedings of the 1st international workshop on Random testing
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks
ICDCS '06 Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
Toward Secure Low Rate Wireless Personal Area Networks
IEEE Transactions on Mobile Computing
New architecture for intra-domain network security issues
Communications of the ACM - Entertainment networking
A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation
DASC '06 Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
A scalable approach to attack graph generation
Proceedings of the 13th ACM conference on Computer and communications security
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Network Security Essentials
Network Routing: Algorithms, Protocols, and Architectures
Network Routing: Algorithms, Protocols, and Architectures
The Security Development Lifecycle
The Security Development Lifecycle
Mesh-based Survivable Transport Networks: Options and Strategies for Optical, MPLS, SONET and ATM Networking
Inside Network Perimeter Security (2nd Edition) (Inside)
Inside Network Perimeter Security (2nd Edition) (Inside)
Minimum-cost network hardening using attack graphs
Computer Communications
Automated adaptive intrusion containment in systems of interacting services
Computer Networks: The International Journal of Computer and Telecommunications Networking
Joint data streaming and sampling techniques for detection of super sources and destinations
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Inferring internet denial-of-service activity
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Very fast containment of scanning worms
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
On the Selection of Error Model(s) for OS Robustness Evaluation
DSN '07 Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
Trust Negotiation in Identity Management
IEEE Security and Privacy
IEEE Transactions on Pattern Analysis and Machine Intelligence
PP-trust-X: A system for privacy preserving trust negotiations
ACM Transactions on Information and System Security (TISSEC)
An empirical study of the robustness of Windows NT applications using random testing
WSS'00 Proceedings of the 4th conference on USENIX Windows Systems Symposium - Volume 4
NetKuang: a multi-host configuration vulnerability checker
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Windows XP kernel crash analysis
LISA '06 Proceedings of the 20th conference on Large Installation System Administration
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations
ICDCS '07 Proceedings of the 27th International Conference on Distributed Computing Systems
Hardware-Related Software Errors: Measurement and Analysis
IEEE Transactions on Software Engineering
Streets of Byzantium: Network Architectures for Fast Reliable Broadcasts
IEEE Transactions on Software Engineering
The N-Version Approach to Fault-Tolerant Software
IEEE Transactions on Software Engineering
Spin model checker, the: primer and reference manual
Spin model checker, the: primer and reference manual
Network security: private communication in a public world, second edition
Network security: private communication in a public world, second edition
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
Computer Communications
Fault-models in wireless communication: towards survivable ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Real-time risk assessment with network sensors and intrusion detection systems
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
A novel hybrid crypto-biometric authentication scheme for ATM based banking applications
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Integrating IDS alert correlation and OS-Level dependency tracking
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
A biometric encryption approach incorporating fingerprint indexing in key generation
ICIC'06 Proceedings of the 2006 international conference on Computational Intelligence and Bioinformatics - Volume Part III
Responding to Anomalous Database Requests
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
Privilege states based access control for fine-grained intrusion response
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Spare capacity allocation using shared backup path protection for dual link failures
Computer Communications
Hi-index | 0.00 |
In today's fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA).KEY FEATURES* The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance* Additional focus on security and survivability issues in wireless networks