The Case for Robust Adaptation: Autonomic Resource Management is a Vulnerability
Autonomic resource management for distributed edge computing systems provides an
effective means of enabling dynamic placement and adaptation in the face of network …
effective means of enabling dynamic placement and adaptation in the face of network …
Tornadoes in the cloud: Worst-case attacks on distributed resources systems
J Tavori, H Levy - IEEE INFOCOM 2021-IEEE Conference on …, 2021 - ieeexplore.ieee.org
Geographically distributed cloud networks are used by a variety of applications and services
worldwide. As the demand for these services increases, their data centers form an attractive …
worldwide. As the demand for these services increases, their data centers form an attractive …
Issues and Challenges in Autonomic Computing and Resource Management
G Sobers Smiles David, T Hemanth, P Raj… - Autonomic Computing in …, 2021 - Springer
Autonomic computing is an operating environment that is on demand and responds to
problems, threats, and failures automatically. It provides a computing environment that can …
problems, threats, and failures automatically. It provides a computing environment that can …
[PDF][PDF] Towards Autonomic Enterprise Security: Self-Defending Platforms, Distributed Detection, and Adaptive Feedback.
Enterprises today face a constant barrage of security threats stemming from worms, viruses,
trojans, and other malware. This is in spite of significant levels of investment in defenses …
trojans, and other malware. This is in spite of significant levels of investment in defenses …
Adaptive resource management enabling deception (ARMED)
Distributed Denial of Service (DDoS) attacks routinely disrupt access to critical services.
Mitigation of these attacks often relies on planned over-provisioning or elastic provisioning …
Mitigation of these attacks often relies on planned over-provisioning or elastic provisioning …
Distributed computing for internet of things under adversarial environments
G Sankar Ramachandran, LA Garcia… - IoT for Defense and …, 2022 - Wiley Online Library
IoT applications of increasing complexity for many applications require in‐network
processing of data from many sources, leveraging hybrid edge and cloud computing …
processing of data from many sources, leveraging hybrid edge and cloud computing …
Securing cloud-hosted applications using active defense with rule-based adaptations
VV Akashe - 2021 - mospace.umsystem.edu
Security cloud-based applications is a dynamic problem since modern attacks are always
evolving in their sophistication and disruption impact. Active defense is a state-of-the-art …
evolving in their sophistication and disruption impact. Active defense is a state-of-the-art …
[引用][C] Introduction: Security, Resiliency, and Technology for Adversarial Environments
A Swami - IoT for Defense and National Security, 2022 - Wiley Online Library
Internet of Things (IoT) devices, platforms and networks deployed for critical national
infrastructure or military applications face unique security challenges compared to …
infrastructure or military applications face unique security challenges compared to …
Dynamic System Diversification for Securing Cloud-based IoT Subnetworks
Remote exploitation attacks use software vulnerabilities to penetrate through a network of
Internet of Things (IoT) devices. This work addresses defending against remote exploitation …
Internet of Things (IoT) devices. This work addresses defending against remote exploitation …
PROSE–proactive resilience in Internet of Things: targeted attacks and countermeasures
U Ashraf - IEEE Sensors Journal, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) is the frontier of wireless networking and provides unprecedented
control and information over the network. In particular, the advent of Industrial IoTs and the …
control and information over the network. In particular, the advent of Industrial IoTs and the …