Quite often failures in network based services and server systems may not be accidental, but rather caused by deliber-ate security intrusions. We would like such systems to either completely preclude the possibility of a security intrusion or design them to be robust enough to continue functioning de-spite security attacks. Not only is it important to prevent or tolerate security intrusions, it is equally important to treat security as a QoS attribute at par with, if not more impor-tant than other QoS attributes such as availability and per-formability. This paper deals with various issues related to quantifying the security attribute of an intrusion tolerant system, such as the SITAR system. A security intrusion and the response of an intr...
147 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2003.Security problems in computer...
This paper aims to analyze transient security and dependability of a vulnerable critical system, und...
Denial-of-Service (DoS) attacks are virulent to both computer and networked systems. Modeling and ev...
Security is a topic of ever increasing interest. Today it is widely accepted that, due to the unavoi...
Since security is increasingly the principal concern in the conception and implementation of softwar...
This paper suggests a quantitative approach to security, and specifically to a security-concept, whi...
International audienceThe objective of this work is the evaluation of information systems security u...
This paper is based on a conceptual framework in which security can be split into two generic types ...
Intrusion detection research has been so far mostly concentrated on techniques that effectively iden...
This paper is based on a conceptual framework in which security can be split into two generic types ...
This study proposes a stochastic Petri net model for evaluating the security and resilience of cyber...
Abstract—In this paper we quantitatively evaluate depend-ability/security of a computer-based system...
Development of Cybersecurity processes and strategies should take two main approaches. One is to dev...
Proceedings of the 39th Hawaii International Conference on System Sciences- 2006potential attacks if...
Modeling and analyzing security of networked systems is an im-portant problem in the emerging Scienc...
147 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2003.Security problems in computer...
This paper aims to analyze transient security and dependability of a vulnerable critical system, und...
Denial-of-Service (DoS) attacks are virulent to both computer and networked systems. Modeling and ev...
Security is a topic of ever increasing interest. Today it is widely accepted that, due to the unavoi...
Since security is increasingly the principal concern in the conception and implementation of softwar...
This paper suggests a quantitative approach to security, and specifically to a security-concept, whi...
International audienceThe objective of this work is the evaluation of information systems security u...
This paper is based on a conceptual framework in which security can be split into two generic types ...
Intrusion detection research has been so far mostly concentrated on techniques that effectively iden...
This paper is based on a conceptual framework in which security can be split into two generic types ...
This study proposes a stochastic Petri net model for evaluating the security and resilience of cyber...
Abstract—In this paper we quantitatively evaluate depend-ability/security of a computer-based system...
Development of Cybersecurity processes and strategies should take two main approaches. One is to dev...
Proceedings of the 39th Hawaii International Conference on System Sciences- 2006potential attacks if...
Modeling and analyzing security of networked systems is an im-portant problem in the emerging Scienc...
147 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2003.Security problems in computer...
This paper aims to analyze transient security and dependability of a vulnerable critical system, und...
Denial-of-Service (DoS) attacks are virulent to both computer and networked systems. Modeling and ev...