Damage assessment and repair in attack resilient distributed database systems
Preventive measures sometimes fail to defect malicious attacks. With attacks on data-
intensive applications becoming an ever more serious threat, intrusion tolerant database …
intensive applications becoming an ever more serious threat, intrusion tolerant database …
Modeling and evaluating the survivability of an intrusion tolerant database system
The immaturity of current intrusion detection techniques limits the traditional security systems
in surviving malicious attacks. Intrusion tolerance approaches have emerged to overcome …
in surviving malicious attacks. Intrusion tolerance approaches have emerged to overcome …
A semi-markov survivability evaluation model for intrusion tolerant database systems
Survivability modeling and evaluation have gained increasing importance. Most existing
models assume that the distributions for transitions between states are exponential …
models assume that the distributions for transitions between states are exponential …
[PDF][PDF] 入侵容忍实时数据库的半马尔可夫生存能力评价模型
陈长清, 裴小兵, 周恒, 刘云生 - 计算机学报, 2011 - cjc.ict.ac.cn
摘要针对事务和数据的实时特性, 给出了具有入侵容忍能力的实时数据库系统的体系架构.
基于实时性的要求和入侵检测存在的延迟, 提出了半马尔可夫评价模型, 对实时数据库在入侵 …
基于实时性的要求和入侵检测存在的延迟, 提出了半马尔可夫评价模型, 对实时数据库在入侵 …
Evaluating the survivability of Intrusion Tolerant Database systems and the impact of intrusion detection deficiencies
The immaturity of current intrusion detection techniques limits traditional security
mechanisms in surviving malicious attacks. Intrusion tolerance approaches have emerged to …
mechanisms in surviving malicious attacks. Intrusion tolerance approaches have emerged to …
[PDF][PDF] Architectures for self-healing databases under cyber attacks
P Liu, J Jing - International Journal of Computer Science and …, 2006 - Citeseer
In this paper, we propose five architectures for self-healing databases under malicious
attacks. While traditional secure database systems rely on prevention controls, a self-healing …
attacks. While traditional secure database systems rely on prevention controls, a self-healing …
V2V: A second variation on query-by-humming
WP Birmingham, K O'Malley, JW Dunn… - … Joint Conference on …, 2003 - ieeexplore.ieee.org
Music information retrieval (MIR) systems tend to fall into two camps: that camp developing
cataloging and providing advanced access systems for large collections of music and that …
cataloging and providing advanced access systems for large collections of music and that …
Survivability Evaluation Modeling Techniques and Measures
H Wang - Handbook of Research on Information Security and …, 2009 - igi-global.com
This chapter introduces the survivability evaluation, especially on the corresponding
evaluation criteria and modeling techniques. The content of this chapter includes an …
evaluation criteria and modeling techniques. The content of this chapter includes an …