A survey of software aging and rejuvenation studies

D Cotroneo, R Natella, R Pietrantuono… - ACM Journal on …, 2014 - dl.acm.org
Software aging is a phenomenon plaguing many long-running complex software systems,
which exhibit performance degradation or an increasing failure rate. Several strategies …

Efficient remote data possession checking in critical information infrastructures

F Sebé, J Domingo-Ferrer… - … on Knowledge and …, 2008 - ieeexplore.ieee.org
Checking data possession in networked information systems such as those related to critical
infrastructures (power facilities, airports, data vaults, defense systems, etc.) is a matter of …

A systematic survey of self-protecting software systems

E Yuan, N Esfahani, S Malek - ACM Transactions on Autonomous and …, 2014 - dl.acm.org
Self-protecting software systems are a class of autonomic systems capable of detecting and
mitigating security threats at runtime. They are growing in importance, as the stovepipe static …

Architecture-based self-protecting software systems

E Yuan, S Malek, B Schmerl, D Garlan… - Proceedings of the 9th …, 2013 - dl.acm.org
Since conventional software security approaches are often manually developed and
statically deployed, they are no longer sufficient against today's sophisticated and evolving …

Fault tolerance via diversity for off-the-shelf products: A study with SQL database servers

I Gashi, P Popov, L Strigini - IEEE Transactions on Dependable …, 2007 - ieeexplore.ieee.org
If an off-the-shelf software product exhibits poor dependability due to design faults, then
software fault tolerance is often the only way available to users and system integrators to …

From analyzing operating system vulnerabilities to designing multiversion intrusion-tolerant architectures

A Gorbenko, A Romanovsky, O Tarasyuk… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
This paper analyzes security problems of modern computer systems caused by
vulnerabilities in their operating systems (OSs). Our scrutiny of widely used enterprise OSs …

F (I) MEA-technique of web services analysis and dependability ensuring

A Gorbenko, V Kharchenko, O Tarasyuk… - … of Complex Fault …, 2006 - Springer
Dependability analysis of the Web Services (WSs), dsclosure of possible failure modes and
their effects are open problems. This paper gives results of the Web Services dependability …

Securing iot-based cyber-physical human systems against collaborative attacks

SAP Kumar, B Bhargava, R Macêdo… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Security issues in the IoT based CPS are exacerbated with human participation in CPHS
due to the vulnerabilities in both the technologies and the human involvement. A holistic …

A comparison of intrusion-tolerant system architectures

Q Nguyen, A Sood - IEEE Security & Privacy, 2010 - ieeexplore.ieee.org
Comparative Analysis of Intrusion-Tolerant System Architectures Page 1 1 Comparative
Analysis of Intrusion-Tolerant System Architectures Quyen L. Nguyen1 and Arun Sood1,2 …

Adaptive cyberdefense for survival and intrusion tolerance

M Atighetchi, P Pal, F Webber, R Schantz… - IEEE Internet …, 2004 - ieeexplore.ieee.org
While providing some resistance against cyberattacks, current approaches to securing
networked and distributed information systems are mainly concerned with static prevention …