Intrusion tolerance

Results: 13



#Item
1Software / Computing / Cyberwarfare / Computer network security / Computer security / Warez / Zero-day / Vulnerability database / Vulnerability / Common Vulnerabilities and Exposures / NetBSD / Solaris

OS Diversity for Intrusion Tolerance: Myth or Reality? Miguel Garcia∗ , Alysson Bessani∗ , Ilir Gashi† , Nuno Neves∗ and Rafael Obelheiro‡ ∗ LaSIGE, University of Lisbon, Faculty of Sciences – Lisbon, Portu

Add to Reading List

Source URL: www.di.fc.ul.pt

Language: English - Date: 2011-04-15 13:02:34
2Computer security / Computer network security / Vulnerability / Software testing / Vulnerability database / National Vulnerability Database / Zero-day / CVSS / Common Vulnerabilities and Exposures / Attack / Buffer overflow / Social vulnerability

SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

Add to Reading List

Source URL: www.di.fc.ul.pt

Language: English - Date: 2013-01-18 09:24:08
3

Intrusion Tolerance The Crutial Way of Critical Infrastructure Protection Critical infrastructures are essentially physical processes controlled by networked computers. They’re usually as

Add to Reading List

Source URL: www.di.fc.ul.pt

Language: English - Date: 2008-10-21 14:22:14
    4Data synchronization / Fault-tolerant computer systems / State machine replication / Replication / Fault tolerance / Wormhole / Replica / Recovery approach

    Resilient Intrusion Tolerance through Proactive and Reactive Recovery∗ Paulo Sousa Alysson Neves Bessani Miguel Correia Nuno Ferreira Neves Paulo Verissimo

    Add to Reading List

    Source URL: www.di.fc.ul.pt

    Language: English - Date: 2007-09-14 10:45:26
    5Computing / Engineering / Physics / Data synchronization / Fault-tolerant computer systems / Replication / Wormhole / Replica / Fault tolerance

    1 Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery Paulo Sousa, Member, IEEE, Alysson Neves Bessani, Miguel Correia, Member, IEEE, Nuno Ferreira Neves, Member, IEEE, Paulo Verissimo, Fellow,

    Add to Reading List

    Source URL: www.di.fc.ul.pt

    Language: English - Date: 2009-05-27 14:24:49
    6Technology / Computer security / Fault tolerance / Intrusion tolerance / SCADA / Verissimo / Computer network / Neves / Resilience / National security / Security / Public safety

    Resilient PCS Cyber Architectures Challenges of Architecting Resilient Critical Information Infrastructures ENISA-FORTH Summer School on Network and Information Security Heraklion, Crete, Greece, September 2008

    Add to Reading List

    Source URL: www.nis-summer-school.eu

    Language: English - Date: 2008-10-20 04:40:09
    7Software engineering / Inter-process communication / Common Object Request Broker Architecture / Component-based software engineering / Object-oriented programming / Intrusion tolerance / Fault-tolerant system / Byzantine fault tolerance / Computer security / Computing / Fault tolerance / Fault-tolerant computer systems

    Intrusion Tolerant CORBA: Beyond Fault Tolerance DOCsec2001 Annapolis, MD March 29, 2001

    Add to Reading List

    Source URL: www.omg.org

    Language: English - Date: 2009-05-28 13:16:01
    8Transmission Control Protocol / Replication / Computer architecture / Network protocols / Fault-tolerant computer systems / Data synchronization / Computing

    ByzID: Byzantine Fault Tolerance from Intrusion Detection Sisi Duan Karl Levitt Hein Meling Sean Peisert Haibin Zhang

    Add to Reading List

    Source URL: www.ux.uis.no

    Language: English - Date: 2014-11-29 05:01:28
    9Data synchronization / Computer storage / Theory of computation / Replication / Byzantine fault tolerance / Intrusion tolerance / State machine replication / Fault-tolerant system / Communications protocol / Computing / Fault-tolerant computer systems / Fault tolerance

    INTRUSION-TOLERANT REPLICATION UNDER ATTACK by Jonathan Kirsch

    Add to Reading List

    Source URL: www.dsn.jhu.edu

    Language: English - Date: 2013-09-20 16:47:28
    10Physical geography / Taxodium distichum / Brackish water / Wetland / Salinity / Aquatic ecology / Water / Ecology

    Salt Tolerance of Southern Baldcypress Historically, cypress-tupelo swamps covered much of the low-lying coastal regions of the Southeast. However, saltwater intrusion and increased flooding over the past 30 years, comb

    Add to Reading List

    Source URL: www.nwrc.usgs.gov

    Language: English - Date: 2012-07-06 09:16:21
    UPDATE