A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability

M Al-Kuwaiti, N Kyriakopoulos… - … surveys & tutorials, 2009 - ieeexplore.ieee.org
A number of qualitative and quantitative terms are used to describe the performance of what
has come to be known as information systems, networks or infrastructures. However, some …

Towards secure and dependable software-defined networks

D Kreutz, FMV Ramos, P Verissimo - … workshop on Hot topics in software …, 2013 - dl.acm.org
Software-defined networking empowers network operators with more flexibility to program
their networks. With SDN, network management moves from codifying functionality in terms …

Data plane programmability beyond openflow: Opportunities and challenges for network and service operations and management

WL da Costa Cordeiro, JA Marques… - Journal of Network and …, 2017 - Springer
SDN and OpenFlow reshaped the way we configure forwarding devices and determine
network behavior, by offering an open interface upon which apps like routing, monitoring …

Prime: Byzantine replication under attack

Y Amir, B Coan, J Kirsch, J Lane - IEEE transactions on …, 2010 - ieeexplore.ieee.org
Existing Byzantine-resilient replication protocols satisfy two standard correctness criteria,
safety and liveness, even in the presence of Byzantine faults. The runtime performance of …

A systematic survey of self-protecting software systems

E Yuan, N Esfahani, S Malek - ACM Transactions on Autonomous and …, 2014 - dl.acm.org
Self-protecting software systems are a class of autonomic systems capable of detecting and
mitigating security threats at runtime. They are growing in importance, as the stovepipe static …

Architecture-based self-protecting software systems

E Yuan, S Malek, B Schmerl, D Garlan… - Proceedings of the 9th …, 2013 - dl.acm.org
Since conventional software security approaches are often manually developed and
statically deployed, they are no longer sufficient against today's sophisticated and evolving …

The CRUTIAL way of critical infrastructure protection

AN Bessani, P Sousa, M Correia… - IEEE Security & …, 2008 - ieeexplore.ieee.org
Critical infrastructures such as the power grid are essentially physical processes controlled
by computers connected by networks. They're usually as vulnerable as any other …

Byzantine replication under attack

Y Amir, B Coan, J Kirsch, J Lane - 2008 IEEE International …, 2008 - ieeexplore.ieee.org
Existing Byzantine-resilient replication protocols satisfy two standard correctness criteria,
safety and liveness, in the presence of Byzantine faults. In practice, however, faulty …

Towards safe and secure autonomous and cooperative vehicle ecosystems

A Lima, F Rocha, M Völp… - Proceedings of the 2nd …, 2016 - dl.acm.org
Semi-autonomous driver assists are already widely deployed and fully autonomous cars are
progressively leaving the realm of laboratories. This evolution coexists with a progressive …

Securing unmanned autonomous systems from cyber threats

BB Madan, M Banik, D Bein - The Journal of Defense …, 2019 - journals.sagepub.com
Unmanned systems, with and without a human-in-the loop, are being deployed in a range of
military and civilian applications spanning air, ground, sea-surface and undersea …