The design and implementation of tripwire: a file system integrity checker
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Runtime Performance Modeling and Measurement of Adaptive Distributed Object Applications
On the Move to Meaningful Internet Systems, 2002 - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002
Experience with EMERALD to Date
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
Building Auto-Adaptive Distributed Applications: The QuO-APOD Experience
ICDCSW '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense
ISORC '03 Proceedings of the Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing
Packaging Quality of Service Control Behaviors for Reuse
ISORC '02 Proceedings of the Fifth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing
Building adaptive distributed applications with middleware and aspects
Proceedings of the 3rd international conference on Aspect-oriented software development
A holistic approach to service survivability
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
Network Security: Know It All: Know It All
Network Security: Know It All: Know It All
Multi-agent framework for simulation of adaptive cooperative defense against internet attacks
AIS-ADM'07 Proceedings of the 2nd international conference on Autonomous intelligent systems: agents and data mining
Advanced Adaptive Application (A3) Environment: initial experience
Proceedings of the Middleware 2011 Industry Track Workshop
Autonomous agents and multi –agent systems (AAMAS) for the military – issues and challenges
DAMAS'05 Proceedings of the 2005 international conference on Defence Applications of Multi-Agent Systems
Moving target defense (MTD) in an adaptive execution environment
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
A Systematic Survey of Self-Protecting Software Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Information-Knowledge-Systems Management
Hi-index | 0.00 |
While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with static prevention measures. For example, signature-based systems can only detect known attacks and tend to provide brittle, all-or-nothing protection. New work in survivability and intrusion tolerance focuses on augmenting existing information systems with adaptive defenses.A middleware-based survivability toolkit lets applications use network- and host-based mechanisms in their own defense.