Model-Based Evaluation: From Dependability to Security
IEEE Transactions on Dependable and Secure Computing
Archetypal behavior in computer security
Journal of Systems and Software
International Journal of Information and Computer Security
Transactions on Computational Science IV
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Optimizing security measures in an intrusion tolerant database system
ISAS'08 Proceedings of the 5th international conference on Service availability
Understanding dynamic denial of service attacks in mobile ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
On design tradeoffs between security and performance in wireless group communicating systems
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Computer system survivability modelling by using stochastic activity network
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Availability analysis of an IMS-based VoIP network system
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
A stochastic model of attack process for the evaluation of security metrics
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
An increasing number of computer systems are designed to be distributed across both local and wide-area networks, performing a multitude of critical information-sharing and computational tasks. Malicious attacks on such systems are a growing concern, where attackers typically seek to degrade quality of service by intrusions that exploit vulnerabilities in networks, operating systems, and application software. Accordingly, designers are seeking improved techniques for validating such systems with respect to specified survivability requirements. In this regard, we describe a model-based validation effort that was undertaken as part of a unified approach to validating a networked intrusion-tolerant information system. Model-based results were used to guide the systemýs design as well as to determine whether a given survivability requirement was satisfied.