Dependability and security models
KS Trivedi, DS Kim, A Roy… - 2009 7th International …, 2009 - ieeexplore.ieee.org
There is a need to quantify system properties methodically. Dependability and security
models have evolved nearly independently. Therefore, it is crucial to develop a classification …
models have evolved nearly independently. Therefore, it is crucial to develop a classification …
[HTML][HTML] Quantitative security evaluation for software system from vulnerability database
This paper proposes a quantitative security evaluation for software system from the
vulnerability data consisting of discovery date, solution date and exploit publish date based …
vulnerability data consisting of discovery date, solution date and exploit publish date based …
Availability analysis of an intrusion tolerant distributed server system with preventive maintenance
We consider availability models of an intrusion tolerant system, and investigate quantitative
effects of preventive maintenance based on security patch releases. The stochastic behavior …
effects of preventive maintenance based on security patch releases. The stochastic behavior …
A semi-markov survivability evaluation model for intrusion tolerant database systems
Survivability modeling and evaluation have gained increasing importance. Most existing
models assume that the distributions for transitions between states are exponential …
models assume that the distributions for transitions between states are exponential …
Quantitative evaluation of intrusion tolerant systems subject to DoS attacks via semi-Markov cost models
T Uemura, T Dohi - Emerging Directions in Embedded and Ubiquitous …, 2007 - Springer
In this paper we quantitatively evaluate the security of intrusion tolerant systems with
preventive maintenance subject to DoS (Denial of Service) attacks. More specifically, we …
preventive maintenance subject to DoS (Denial of Service) attacks. More specifically, we …
[PDF][PDF] 入侵容忍实时数据库的半马尔可夫生存能力评价模型
陈长清, 裴小兵, 周恒, 刘云生 - 计算机学报, 2011 - cjc.ict.ac.cn
摘要针对事务和数据的实时特性, 给出了具有入侵容忍能力的实时数据库系统的体系架构.
基于实时性的要求和入侵检测存在的延迟, 提出了半马尔可夫评价模型, 对实时数据库在入侵 …
基于实时性的要求和入侵检测存在的延迟, 提出了半马尔可夫评价模型, 对实时数据库在入侵 …
Indoor RSSI trilateral algorithm considering piecewise and space-scene
Y Shi, Y Long, F Lu, Z Xu, X Xiao… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Indoor positioning methods based on RSSI-distance mapping were mass used for less
surveying or mapping preparations or seldom additional devices, while the bottleneck is …
surveying or mapping preparations or seldom additional devices, while the bottleneck is …
Diagrams for software synthesis
R Jullig, Y Srinivas - Proceedings of 8th Knowledge-Based …, 1993 - ieeexplore.ieee.org
The authors describe the formal environment at Kesteral for synthesizing programs. The
authors show that straightforward formalization, persistently applied at all levels of system …
authors show that straightforward formalization, persistently applied at all levels of system …
Security evaluation for software system with vulnerability life cycle and user profiles
This paper proposes the definition of a security criterion and security assessment based on
the criterion. More precisely, we present a stochastic model with a vulnerability life-cycle …
the criterion. More precisely, we present a stochastic model with a vulnerability life-cycle …
Availability analysis of a scalable intrusion tolerant architecture with two detection modes
In this paper we consider a discrete-time availability model of an intrusion tolerant system
with two detection modes; automatic detection mode and manual detection mode. The …
with two detection modes; automatic detection mode and manual detection mode. The …