Transient performance analysis of smart grid with dynamic power distribution
X Chang, JM Martínez, KS Trivedi - Information sciences, 2018 - Elsevier
Transient performance analysis of power distribution network (PDN) after a failure
occurrence could facilitate the better design of smart grid. Researchers have proposed …
occurrence could facilitate the better design of smart grid. Researchers have proposed …
Security modeling and analysis of a self-cleansing intrusion tolerance technique
Since security is increasingly the principal concern in the conception and implementation of
software systems, it is very important that the security mechanisms are designed so as to …
software systems, it is very important that the security mechanisms are designed so as to …
[PDF][PDF] 入侵容忍实时数据库的半马尔可夫生存能力评价模型
陈长清, 裴小兵, 周恒, 刘云生 - 计算机学报, 2011 - cjc.ict.ac.cn
摘要针对事务和数据的实时特性, 给出了具有入侵容忍能力的实时数据库系统的体系架构.
基于实时性的要求和入侵检测存在的延迟, 提出了半马尔可夫评价模型, 对实时数据库在入侵 …
基于实时性的要求和入侵检测存在的延迟, 提出了半马尔可夫评价模型, 对实时数据库在入侵 …
An adaptive mode control algorithm of a scalable intrusion tolerant architecture
T Dohi, T Uemura - Journal of Computer and System Sciences, 2012 - Elsevier
In this paper we consider an intrusion tolerant system with two detection modes; automatic
detection mode and manual detection mode for intrusions, which is called SITAR (Scalable …
detection mode and manual detection mode for intrusions, which is called SITAR (Scalable …
Security modeling and analysis of an intrusion tolerant cloud data center
It is important to protect a Cloud Data Center even if there are attacks by an adversary. In
order to improve the security of a Cloud Data Center (CDC) in particular, system availability …
order to improve the security of a Cloud Data Center (CDC) in particular, system availability …
Survivable mobile telecommunication systems
Μ Μυκονιάτη - 2022 - dl.acm.org
Survivable systems are systems that have the ability to maintain their critical services and to
make them available in a timely manner even in cases of accidents, failures or attacks. The …
make them available in a timely manner even in cases of accidents, failures or attacks. The …
A quantitative fault tolerance evaluation model for topology in wireless sensor networks based on the semi-Markov process
R Yin, B Liu, H Liu, Y Li, M Dong - Neurocomputing, 2015 - Elsevier
Fault tolerance evaluation has gained increasing importance. In this paper, the semi-Markov
process is introduced to describe the fault tolerance of topology in wireless sensor networks …
process is introduced to describe the fault tolerance of topology in wireless sensor networks …
Survivability analysis of a computer system under an advanced persistent threat attack
Computer systems are potentially targeted by cybercriminals by means of specially crafted
malicious software called Advanced Persistent Threats (APTs). As a consequence, any …
malicious software called Advanced Persistent Threats (APTs). As a consequence, any …