Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
ACM SIGOPS Operating Systems Review
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
Defining defects, errors, and service degradations
ACM SIGSOFT Software Engineering Notes
On Limitations of Friendly Jamming for Confidentiality
SP '13 Proceedings of the 2013 IEEE Symposium on Security and Privacy
Hi-index | 0.00 |
Computer systems invest substantial resources in securing their service. Costs of failure prevention are balanced against those of detection and recovery, even though recovery mechanisms can cause greater degradations of services. Most computer users consider degradations of service to be insidious and injurious. Yet, service degradations commonly assist in both the prevention and the curtailment of failures. Their toleration enables service continuation following fault activation, during which degradations are monitored for symptoms of security breaches.