A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability
M Al-Kuwaiti, N Kyriakopoulos… - … surveys & tutorials, 2009 - ieeexplore.ieee.org
A number of qualitative and quantitative terms are used to describe the performance of what
has come to be known as information systems, networks or infrastructures. However, some …
has come to be known as information systems, networks or infrastructures. However, some …
Towards secure and dependable software-defined networks
Software-defined networking empowers network operators with more flexibility to program
their networks. With SDN, network management moves from codifying functionality in terms …
their networks. With SDN, network management moves from codifying functionality in terms …
Data plane programmability beyond openflow: Opportunities and challenges for network and service operations and management
WL da Costa Cordeiro, JA Marques… - Journal of Network and …, 2017 - Springer
SDN and OpenFlow reshaped the way we configure forwarding devices and determine
network behavior, by offering an open interface upon which apps like routing, monitoring …
network behavior, by offering an open interface upon which apps like routing, monitoring …
Prime: Byzantine replication under attack
Y Amir, B Coan, J Kirsch, J Lane - IEEE transactions on …, 2010 - ieeexplore.ieee.org
Existing Byzantine-resilient replication protocols satisfy two standard correctness criteria,
safety and liveness, even in the presence of Byzantine faults. The runtime performance of …
safety and liveness, even in the presence of Byzantine faults. The runtime performance of …
A systematic survey of self-protecting software systems
Self-protecting software systems are a class of autonomic systems capable of detecting and
mitigating security threats at runtime. They are growing in importance, as the stovepipe static …
mitigating security threats at runtime. They are growing in importance, as the stovepipe static …
Architecture-based self-protecting software systems
Since conventional software security approaches are often manually developed and
statically deployed, they are no longer sufficient against today's sophisticated and evolving …
statically deployed, they are no longer sufficient against today's sophisticated and evolving …
The CRUTIAL way of critical infrastructure protection
Critical infrastructures such as the power grid are essentially physical processes controlled
by computers connected by networks. They're usually as vulnerable as any other …
by computers connected by networks. They're usually as vulnerable as any other …
Byzantine replication under attack
Y Amir, B Coan, J Kirsch, J Lane - 2008 IEEE International …, 2008 - ieeexplore.ieee.org
Existing Byzantine-resilient replication protocols satisfy two standard correctness criteria,
safety and liveness, in the presence of Byzantine faults. In practice, however, faulty …
safety and liveness, in the presence of Byzantine faults. In practice, however, faulty …
Towards safe and secure autonomous and cooperative vehicle ecosystems
Semi-autonomous driver assists are already widely deployed and fully autonomous cars are
progressively leaving the realm of laboratories. This evolution coexists with a progressive …
progressively leaving the realm of laboratories. This evolution coexists with a progressive …
Securing unmanned autonomous systems from cyber threats
BB Madan, M Banik, D Bein - The Journal of Defense …, 2019 - journals.sagepub.com
Unmanned systems, with and without a human-in-the loop, are being deployed in a range of
military and civilian applications spanning air, ground, sea-surface and undersea …
military and civilian applications spanning air, ground, sea-surface and undersea …