Fireflies: A secure and scalable membership and gossip service

HD Johansen, RV Renesse, Y Vigfusson… - ACM Transactions on …, 2015 - dl.acm.org
An attacker who controls a computer in an overlay network can effectively control the entire
overlay network if the mechanism managing membership information can successfully be …

Practical intrusion-tolerant networks

D Obenshain, T Tantillo, A Babay… - 2016 IEEE 36th …, 2016 - ieeexplore.ieee.org
As the Internet becomes an important part of the infrastructure our society depends on, it is
crucial to construct networks that are able to work even when part of the network is …

Self-adaptable and intrusion tolerant certificate authority for mobile ad hoc networks

FC Pereira, J da Silva Fraga… - … and Applications (aina …, 2008 - ieeexplore.ieee.org
Dynamic distributed systems like peer-to-peer systems, overlay networks and mobile ad hoc
networks must execute their applications using distributed resources and in a decentralized …

Overlay network topology reconfiguration in byzantine settings

RR Obelheiro, J da Silva Fraga - 13th Pacific Rim International …, 2007 - ieeexplore.ieee.org
Many fault-tolerant systems rely on overprovisioning of system resources to provide spare
capacity that can compensate for faulty components. However, this approach often results in …

Underwater integral photography

N Maki, K Yanaka - 2015 IEEE Virtual Reality (VR), 2015 - ieeexplore.ieee.org
A novel integral photography (IP) system in which the amount of pop** out is more than
three times larger than usual is demonstrated in this study. If autostereoscopic display is …

Network nodes

Y Huang, D Parker - US Patent 8,995,251, 2015 - Google Patents
BACKGROUND Wireless mesh networks (WMNs) are multi-hop infra structure-less networks
characterized by dynamic self-orga nization, self-configuration and self-healing. These …

[PDF][PDF] Intrusion-tolerant membership management for peer-to-peer overlay networks

HD Johansen - 2007 - cs.uit.no
Abstract Peer-to-Peer (P2P) computing has emerged as a cost-effective approach for
constructing large-scale wide-area Internet services. Many generic P2P middleware …

A formal treatment of efficient byzantine routing against fully byzantine adversary

S Goenka, S Duan, H Zhang - 2018 IEEE 17th International …, 2018 - ieeexplore.ieee.org
We describe efficient path-based Byzantine routing protocols that are secure against fully
Byzantine adversaries. Our work is in sharp contrast to prior works which handle a weaker …

Attack-Tolerant Communication in a Siem Tool

RJP Fonseca - 2012 - search.proquest.com
Abstract Uma ferramenta SIEM (Security Information and Event Management) representa
uma solução que combina a coleção de eventos em tempo real através da monitorização …

[PDF][PDF] D5. 1.1-Preliminary Resilient Framework Architecture

A Costa, A Bessani, P Verissimo - 2011 - cordis.europa.eu
The document presents a preliminary architecture for a Security Information and Event
Management (SIEM) system, focusing on aspects related to the resilient operation of …