The multiple facets of software diversity: Recent developments in year 2000 and beyond
Early experiments with software diversity in the mid 1970s investigated N-version
programming and recovery blocks to increase the reliability of embedded systems. Four …
programming and recovery blocks to increase the reliability of embedded systems. Four …
Diversify: ecology-inspired software evolution for diversity emergence
DIVERSIFY is an EU funded project, which aims at favoring spontaneous diversification in
software systems in order to increase their adaptive capacities. This objective is founded on …
software systems in order to increase their adaptive capacities. This objective is founded on …
Extreme bandits using robust statistics
Motivated by situations where the extreme values–as opposed to expected values in the
classical stochastic multi-armed bandit (MAB) setting–are of interest, we propose a …
classical stochastic multi-armed bandit (MAB) setting–are of interest, we propose a …
面向主动防御的多样性研究进展
仝青, 郭云飞, 霍树民, 王亚文 - Journal of Cyber Security, 2022 - jcs.iie.ac.cn
不同软件或执行过程通常存在不同的脆弱性, 多样性技术基于该前提应用于系统的可靠性,
安全性设计中, 显著增**了系统的防御能力和入侵容忍能力, 然而也存在系统代价高 …
安全性设计中, 显著增**了系统的防御能力和入侵容忍能力, 然而也存在系统代价高 …
[PDF][PDF] Non-contact measurement of soil moisture content using thermal infrared sensor and weather variables
T Alshikaili - 2007 - harvest.usask.ca
The use of remote sensing technology has made it possible for the non-contact
measurement of soil moisture content (SMC). Many remote sensing techniques can be used …
measurement of soil moisture content (SMC). Many remote sensing techniques can be used …
Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security
We propose a new security paradigm that makes cross-layer personalization a premier
component in the design of security solutions for computer infrastructure and situational …
component in the design of security solutions for computer infrastructure and situational …
[KİTAP][B] A novel intrusion detection system (ids) architecture: Attack detection based on snort for multistage attack scenarios in a multi-cores environment
JFPD De Muila - 2010 - search.proquest.com
Recent research has indicated that although security systems are develo**, illegal
intrusion to computers is on the rise. The research conducted here illustrates that improving …
intrusion to computers is on the rise. The research conducted here illustrates that improving …
[PDF][PDF] Implementation and evaluation of a low-cost intrusion detection system for community wireless mesh networks
W Quibell - 2015 - harvest.usask.ca
Rural Community Wireless Mesh Networks (WMN) can be great assets to rural communities,
hel** them connect to the rest of their region and beyond. However, they can be a liability …
hel** them connect to the rest of their region and beyond. However, they can be a liability …
[PDF][PDF] Optimisation des infrastructures réseaux
F Giroire - 2018 - inria.hal.science
Je présente dans ce document les travaux de recherche que j'ai effectués depuis ma
soutenance de these en novembre 2006. Au cours de ces années, je me suis …
soutenance de these en novembre 2006. Au cours de ces années, je me suis …
[PDF][PDF] Cross-Layer Personalization as a First-Class Citizen for Situation Awareness and Computer Infrastructure Security
ACPBD Oliver, WNEB Matthews, J Crandall, X Wei… - cs.unm.edu
We propose a new security paradigm that makes cross-layer personalization a premier
component in the design of security solutions for computer infrastructure and situational …
component in the design of security solutions for computer infrastructure and situational …