The Case for Robust Adaptation: Autonomic Resource Management is a Vulnerability

J Noor, A Ali-Eldin, L Garcia, C Rao… - MILCOM 2019-2019 …, 2019 - ieeexplore.ieee.org
Autonomic resource management for distributed edge computing systems provides an
effective means of enabling dynamic placement and adaptation in the face of network …

Tornadoes in the cloud: Worst-case attacks on distributed resources systems

J Tavori, H Levy - IEEE INFOCOM 2021-IEEE Conference on …, 2021 - ieeexplore.ieee.org
Geographically distributed cloud networks are used by a variety of applications and services
worldwide. As the demand for these services increases, their data centers form an attractive …

Issues and Challenges in Autonomic Computing and Resource Management

G Sobers Smiles David, T Hemanth, P Raj… - Autonomic Computing in …, 2021 - Springer
Autonomic computing is an operating environment that is on demand and responds to
problems, threats, and failures automatically. It provides a computing environment that can …

[PDF][PDF] Towards Autonomic Enterprise Security: Self-Defending Platforms, Distributed Detection, and Adaptive Feedback.

JM Agosta, J Chandrashekar, DH Dash… - Intel technology …, 2006 - academia.edu
Enterprises today face a constant barrage of security threats stemming from worms, viruses,
trojans, and other malware. This is in spite of significant levels of investment in defenses …

Adaptive resource management enabling deception (ARMED)

P Pal, N Soule, N Lageman, SS Clark… - Proceedings of the 12th …, 2017 - dl.acm.org
Distributed Denial of Service (DDoS) attacks routinely disrupt access to critical services.
Mitigation of these attacks often relies on planned over-provisioning or elastic provisioning …

Distributed computing for internet of things under adversarial environments

G Sankar Ramachandran, LA Garcia… - IoT for Defense and …, 2022 - Wiley Online Library
IoT applications of increasing complexity for many applications require in‐network
processing of data from many sources, leveraging hybrid edge and cloud computing …

Securing cloud-hosted applications using active defense with rule-based adaptations

VV Akashe - 2021 - mospace.umsystem.edu
Security cloud-based applications is a dynamic problem since modern attacks are always
evolving in their sophistication and disruption impact. Active defense is a state-of-the-art …

[引用][C] Introduction: Security, Resiliency, and Technology for Adversarial Environments

A Swami - IoT for Defense and National Security, 2022 - Wiley Online Library
Internet of Things (IoT) devices, platforms and networks deployed for critical national
infrastructure or military applications face unique security challenges compared to …

Dynamic System Diversification for Securing Cloud-based IoT Subnetworks

H Almohri, L Watson, D Evans, S Billups - ACM Transactions on …, 2022 - dl.acm.org
Remote exploitation attacks use software vulnerabilities to penetrate through a network of
Internet of Things (IoT) devices. This work addresses defending against remote exploitation …

PROSE–proactive resilience in Internet of Things: targeted attacks and countermeasures

U Ashraf - IEEE Sensors Journal, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) is the frontier of wireless networking and provides unprecedented
control and information over the network. In particular, the advent of Industrial IoTs and the …