Last year, we reported [1] our success in setting a new high-water mark for intrusion tolerance. That success can largely be attrib-uted to our use of a “survivability architecture”, which refers to the organization of a set of concrete defense mechanisms for pre-venting intrusion, and for detecting and responding to intrusions that cannot be prevented. The system defense-enabled with the DPASA survivability architecture [2] showed a high level of re-sistance to sustained attacks by sophisticated adversaries, but needed expert operators to perform the role of an “intelligent con-trol loop”—interpreting the events reported by the survivable system as well as deciding in some cases which defense mecha-nisms to actuate. We took the position th...
Information such as security advisories, emergency recommendations, e-government information, etc., ...
With the rapid development of functional requirements in the emerging Industry 4.0 era, modern indus...
The ever-increasing, novel and sophisticated cyber threats underscore the need for more robust and r...
Many techniques and mechanisms exist today, some COTS, others less mature research products that can...
The growing connectivity of cyber-physical systems (CPSes) has led to an increased concern over the ...
Abstract — This paper charts the course of adaptive behavior in intrusion tolerance, starting from p...
Intrusions on the vetronics architecture often target specific applications. Intruders exploit vulne...
The same network infrastructure that is essential for the operation of today’s high valued distribut...
To attain their goals, attackers have developed highly automated intelligence-driven attack capabili...
Abstract—Providers of critical infrastructure services strive to maintain the high availability of t...
Recent years have witnessed a significant increase in the number of security-related incidents in co...
Survivability refers to the capability of a system to ful ll its mission, in a timely manner, in the...
The Infrastructure of modern society is controlled by soft-ware systems. These systems are vulnerabl...
The pervasive interconnection of systems throughout the world has given computer services a signific...
The growing network attacks and intrusions have put the government organizations at a great risk. In...
Information such as security advisories, emergency recommendations, e-government information, etc., ...
With the rapid development of functional requirements in the emerging Industry 4.0 era, modern indus...
The ever-increasing, novel and sophisticated cyber threats underscore the need for more robust and r...
Many techniques and mechanisms exist today, some COTS, others less mature research products that can...
The growing connectivity of cyber-physical systems (CPSes) has led to an increased concern over the ...
Abstract — This paper charts the course of adaptive behavior in intrusion tolerance, starting from p...
Intrusions on the vetronics architecture often target specific applications. Intruders exploit vulne...
The same network infrastructure that is essential for the operation of today’s high valued distribut...
To attain their goals, attackers have developed highly automated intelligence-driven attack capabili...
Abstract—Providers of critical infrastructure services strive to maintain the high availability of t...
Recent years have witnessed a significant increase in the number of security-related incidents in co...
Survivability refers to the capability of a system to ful ll its mission, in a timely manner, in the...
The Infrastructure of modern society is controlled by soft-ware systems. These systems are vulnerabl...
The pervasive interconnection of systems throughout the world has given computer services a signific...
The growing network attacks and intrusions have put the government organizations at a great risk. In...
Information such as security advisories, emergency recommendations, e-government information, etc., ...
With the rapid development of functional requirements in the emerging Industry 4.0 era, modern indus...
The ever-increasing, novel and sophisticated cyber threats underscore the need for more robust and r...