Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Fireflies: A secure and scalable membership and gossip service
An attacker who controls a computer in an overlay network can effectively control the entire
overlay network if the mechanism managing membership information can successfully be …
overlay network if the mechanism managing membership information can successfully be …
Practical intrusion-tolerant networks
D Obenshain, T Tantillo, A Babay… - 2016 IEEE 36th …, 2016 - ieeexplore.ieee.org
As the Internet becomes an important part of the infrastructure our society depends on, it is
crucial to construct networks that are able to work even when part of the network is …
crucial to construct networks that are able to work even when part of the network is …
Self-adaptable and intrusion tolerant certificate authority for mobile ad hoc networks
FC Pereira, J da Silva Fraga… - … and Applications (aina …, 2008 - ieeexplore.ieee.org
Dynamic distributed systems like peer-to-peer systems, overlay networks and mobile ad hoc
networks must execute their applications using distributed resources and in a decentralized …
networks must execute their applications using distributed resources and in a decentralized …
Overlay network topology reconfiguration in byzantine settings
RR Obelheiro, J da Silva Fraga - 13th Pacific Rim International …, 2007 - ieeexplore.ieee.org
Many fault-tolerant systems rely on overprovisioning of system resources to provide spare
capacity that can compensate for faulty components. However, this approach often results in …
capacity that can compensate for faulty components. However, this approach often results in …
Underwater integral photography
N Maki, K Yanaka - 2015 IEEE Virtual Reality (VR), 2015 - ieeexplore.ieee.org
A novel integral photography (IP) system in which the amount of pop** out is more than
three times larger than usual is demonstrated in this study. If autostereoscopic display is …
three times larger than usual is demonstrated in this study. If autostereoscopic display is …
Network nodes
Y Huang, D Parker - US Patent 8,995,251, 2015 - Google Patents
BACKGROUND Wireless mesh networks (WMNs) are multi-hop infra structure-less networks
characterized by dynamic self-orga nization, self-configuration and self-healing. These …
characterized by dynamic self-orga nization, self-configuration and self-healing. These …
[PDF][PDF] Intrusion-tolerant membership management for peer-to-peer overlay networks
HD Johansen - 2007 - cs.uit.no
Abstract Peer-to-Peer (P2P) computing has emerged as a cost-effective approach for
constructing large-scale wide-area Internet services. Many generic P2P middleware …
constructing large-scale wide-area Internet services. Many generic P2P middleware …
A formal treatment of efficient byzantine routing against fully byzantine adversary
S Goenka, S Duan, H Zhang - 2018 IEEE 17th International …, 2018 - ieeexplore.ieee.org
We describe efficient path-based Byzantine routing protocols that are secure against fully
Byzantine adversaries. Our work is in sharp contrast to prior works which handle a weaker …
Byzantine adversaries. Our work is in sharp contrast to prior works which handle a weaker …
Attack-Tolerant Communication in a Siem Tool
RJP Fonseca - 2012 - search.proquest.com
Abstract Uma ferramenta SIEM (Security Information and Event Management) representa
uma solução que combina a coleção de eventos em tempo real através da monitorização …
uma solução que combina a coleção de eventos em tempo real através da monitorização …
[PDF][PDF] D5. 1.1-Preliminary Resilient Framework Architecture
A Costa, A Bessani, P Verissimo - 2011 - cordis.europa.eu
The document presents a preliminary architecture for a Security Information and Event
Management (SIEM) system, focusing on aspects related to the resilient operation of …
Management (SIEM) system, focusing on aspects related to the resilient operation of …