Author of the publication

Intrusion-tolerant self-healing devices for critical infrastructure protection.

, , , , , and . DSN, page 217-222. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

When 3f+1 Is Not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus., , , , and . DISC, volume 4731 of Lecture Notes in Computer Science, page 480-481. Springer, (2007)Intercept: Profiling Windows Network Device Drivers., and . EWDC, volume 7869 of Lecture Notes in Computer Science, page 61-75. Springer, (2013)Worm-IT - A wormhole-based intrusion-tolerant group communication system., , , and . J. Syst. Softw., 80 (2): 178-197 (2007)RITAS: Services for Randomized Intrusion Tolerance., , , and . IEEE Trans. Dependable Secur. Comput., 8 (1): 122-136 (2011)Low complexity Byzantine-resilient consensus., , , and . Distributed Comput., 17 (3): 237-249 (2005)Tolerating Intrusions in Grid Systems., , and . Security and Management, page 207-220. CSREA Press, (2004)Fault Detection Using Hints from the Socket Layer., and . SRDS, page 64-71. IEEE Computer Society, (1997)Detection and Prediction of Resource-Exhaustion Vulnerabilities., , and . ISSRE, page 87-96. IEEE Computer Society, (2008)Efficient Byzantine-Resilient Reliable Multicast on a Hybrid Failure Model., , , and . SRDS, page 2-11. IEEE Computer Society, (2002)Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available., , , and . SRDS, page 71-82. IEEE Computer Society, (2006)