The multiple facets of software diversity: Recent developments in year 2000 and beyond

B Baudry, M Monperrus - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Early experiments with software diversity in the mid 1970s investigated N-version
programming and recovery blocks to increase the reliability of embedded systems. Four …

Diversify: ecology-inspired software evolution for diversity emergence

B Baudry, M Monperrus, C Mony… - … -IEEE Conference on …, 2014 - ieeexplore.ieee.org
DIVERSIFY is an EU funded project, which aims at favoring spontaneous diversification in
software systems in order to increase their adaptive capacities. This objective is founded on …

Extreme bandits using robust statistics

S Bhatt, P Li, G Samorodnitsky - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Motivated by situations where the extreme values–as opposed to expected values in the
classical stochastic multi-armed bandit (MAB) setting–are of interest, we propose a …

面向主动防御的多样性研究进展

仝青, 郭云飞, 霍树民, 王亚文 - Journal of Cyber Security, 2022 - jcs.iie.ac.cn
不同软件或执行过程通常存在不同的脆弱性, 多样性技术基于该前提应用于系统的可靠性,
安全性设计中, 显著增**了系统的防御能力和入侵容忍能力, 然而也存在系统代价高 …

[PDF][PDF] Non-contact measurement of soil moisture content using thermal infrared sensor and weather variables

T Alshikaili - 2007 - harvest.usask.ca
The use of remote sensing technology has made it possible for the non-contact
measurement of soil moisture content (SMC). Many remote sensing techniques can be used …

Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security

A Chen, P Brahma, DO Wu, N Ebner… - Proceedings of the …, 2016 - dl.acm.org
We propose a new security paradigm that makes cross-layer personalization a premier
component in the design of security solutions for computer infrastructure and situational …

[KİTAP][B] A novel intrusion detection system (ids) architecture: Attack detection based on snort for multistage attack scenarios in a multi-cores environment

JFPD De Muila - 2010 - search.proquest.com
Recent research has indicated that although security systems are develo**, illegal
intrusion to computers is on the rise. The research conducted here illustrates that improving …

[PDF][PDF] Implementation and evaluation of a low-cost intrusion detection system for community wireless mesh networks

W Quibell - 2015 - harvest.usask.ca
Rural Community Wireless Mesh Networks (WMN) can be great assets to rural communities,
hel** them connect to the rest of their region and beyond. However, they can be a liability …

[PDF][PDF] Optimisation des infrastructures réseaux

F Giroire - 2018 - inria.hal.science
Je présente dans ce document les travaux de recherche que j'ai effectués depuis ma
soutenance de these en novembre 2006. Au cours de ces années, je me suis …

[PDF][PDF] Cross-Layer Personalization as a First-Class Citizen for Situation Awareness and Computer Infrastructure Security

ACPBD Oliver, WNEB Matthews, J Crandall, X Wei… - cs.unm.edu
We propose a new security paradigm that makes cross-layer personalization a premier
component in the design of security solutions for computer infrastructure and situational …