Actually, there is growing consensus that for many system applications, safety as well as security demands have to be observed in a coherent manner. In this paper we describe such an integrated approach to protect the nodes of distributed co-operative systems against malicious attacks and unplanned system failures. The basic strategy is the use of special diagnostic agents for that purpose. This agent concept is supported by means of additional diagnostic units modularly added to the processor/memory interface of each node of the system. These units have their own autonomous control which cannot be altered by their corresponding processor. Each instruction transferred to the processor, and each data word transferred to/from the processor, i...
On-line safety monitoring, i.e. the tasks of fault detection and diagnosis, alarm annunciation, and ...
In an open distributed system, agents comprising an application must not only survive (possibly mali...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
Over the last few years, a change in one of the classical paradigms in Control Systems has been happ...
Security in distributed computing systems is usually based on the idea of prevention. The usual appr...
Abstract: Malicious attackers can cause severe damage (financially or to the envi-ronment) if they g...
While there is considerable experience with addressing the needs for security and fault-tolerance i...
This study investigates the fault-tolerant consensus control problem of multi-agent systems subject ...
We present a prototype of an Intrusion Warning System for combining event message flows of multiple ...
In this paper we address the problem of detecting faulty behaviors of cooperative mobile agents. A n...
In this paper we address the problem of detecting faulty behaviors of cooperative mobile agents. A n...
This paper describes some attack and intrusion detection elements of a security architecture for dis...
This thesis introduces a new dimension over which systems dependability may be evaluated, exhaustion...
This thesis presents a new approach to modelling the security and integrity of data in distributed a...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
On-line safety monitoring, i.e. the tasks of fault detection and diagnosis, alarm annunciation, and ...
In an open distributed system, agents comprising an application must not only survive (possibly mali...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
Over the last few years, a change in one of the classical paradigms in Control Systems has been happ...
Security in distributed computing systems is usually based on the idea of prevention. The usual appr...
Abstract: Malicious attackers can cause severe damage (financially or to the envi-ronment) if they g...
While there is considerable experience with addressing the needs for security and fault-tolerance i...
This study investigates the fault-tolerant consensus control problem of multi-agent systems subject ...
We present a prototype of an Intrusion Warning System for combining event message flows of multiple ...
In this paper we address the problem of detecting faulty behaviors of cooperative mobile agents. A n...
In this paper we address the problem of detecting faulty behaviors of cooperative mobile agents. A n...
This paper describes some attack and intrusion detection elements of a security architecture for dis...
This thesis introduces a new dimension over which systems dependability may be evaluated, exhaustion...
This thesis presents a new approach to modelling the security and integrity of data in distributed a...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
On-line safety monitoring, i.e. the tasks of fault detection and diagnosis, alarm annunciation, and ...
In an open distributed system, agents comprising an application must not only survive (possibly mali...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...