Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
Information survivability control systems
Proceedings of the 21st international conference on Software engineering
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Survivability—a new technical and business perspective on security
Proceedings of the 1999 workshop on New security paradigms
Survivable Network System Analysis: A Case Study
IEEE Software
Information Survivability for Evolvable and Adaptable Real-Time Command and Control Systems
IEEE Transactions on Knowledge and Data Engineering
Emergent Algorithms - A New Method for Enhancing Survivability in Unbounded Systems
HICSS '99 Proceedings of the Thirty-second Annual Hawaii International Conference on System Sciences-Volume 7 - Volume 7
Heterogeneous networking: a new survivability paradigm
Proceedings of the 2001 workshop on New security paradigms
A method for modeling and quantifying the security attributes of intrusion tolerant systems
Performance Evaluation - Dependable systems and networks-performance and dependability symposium (DSN-PDS) 2002: Selected papers
Leveraging architectural models to inject trust into software systems
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Diversify sensor nodes to improve resilience against node compromise
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Decision support for network disruption mitigation
Decision Support Systems
Insecure context switching: inoculating regular expressions for survivability
WOOT'08 Proceedings of the 2nd conference on USENIX Workshop on offensive technologies
Computing the fault tolerance of multi-agent deployment
Artificial Intelligence
Unifying strategies and tactics: a survivability framework for countering cyber attacks
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
State space approach to security quantification
COMPSAC-W'05 Proceedings of the 29th annual international conference on Computer software and applications conference
Vulnerability modeling and simulation for DNS intrusion tolerance system construction
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
Modeling and evaluating the survivability of an intrusion tolerant database system
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Hi-index | 0.00 |
Society is increasingly dependent upon large-scale, distributed systems that operate in unbounded network environments. Survivability helps ensure that such systems deliver essential services and maintain essential properties in the face of attacks, failures, and accidents