Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,376,793 papers from all fields of science
Search
Sign In
Create Free Account
Intrusion tolerance
Intrusion tolerance is a fault-tolerant design approach to defending information systems against malicious attack. Abandoning the conventional aim of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Byzantine fault tolerance
Fault-tolerant computer system
Broader (2)
Computer security
Fault tolerance
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2022
2022
Mechanisms of Desiccation Tolerance in Resurrection Vascular Plants
D. Gaff
Mechanisms of Environmental Stress Resistance in…
2022
Corpus ID: 146032819
Highly Cited
2010
Highly Cited
2010
Intrusion and deformation at Campi Flegrei, southern Italy: Sills, dikes, and regional extension
J. Woo
,
C. Kilburn
2010
Corpus ID: 73643382
[1] The Campi Flegrei volcanic district, in southern Italy, has been uplifted since 1968 by a net maximum of 3 m during the…
Expand
Highly Cited
2008
Highly Cited
2008
Mapping QTL tolerance to Phytophthora root rot in soybean using microsatellite and RAPD/SCAR derived markers
Yingpeng Han
,
W. Teng
,
+5 authors
Wenbin Li
Euphytica
2008
Corpus ID: 30706850
Broad tolerance to phytophthora root rot (PRR) caused by Phytophthora sojae has become an important goal for the improvement of…
Expand
Review
2006
Review
2006
A survey of key management in ad hoc networks
A. Hegland
,
E. Winjum
,
S. F. Mjølsnes
,
Chunming Rong
,
Ø. Kure
,
P. Spilling
IEEE Communications Surveys and Tutorials
2006
Corpus ID: 206575876
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their…
Expand
Highly Cited
2005
Highly Cited
2005
MEAD: support for Real‐Time Fault‐Tolerant CORBA
P. Narasimhan
,
Tudor Dumitras
,
+4 authors
Deepti Srivastava
Concurrency Practice and Experience
2005
Corpus ID: 8891052
The OMG's Real‐Time CORBA (RT‐CORBA) and Fault‐Tolerant CORBA (FT‐CORBA) specifications make it possible for today's CORBA…
Expand
Highly Cited
2004
Highly Cited
2004
Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks
Jing Deng
,
Richard O. Han
,
Shivakant Mishra
International Conference on Dependable Systems…
2004
Corpus ID: 5584688
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure…
Expand
Highly Cited
2004
Highly Cited
2004
A method for modeling and quantifying the security attributes of intrusion tolerant systems
B. Madan
,
K. Goseva-Popstojanova
,
K. Vaidyanathan
,
K. Trivedi
Performance evaluation (Print)
2004
Corpus ID: 8446916
Review
2004
Review
2004
Insights into the cellular mechanisms of desiccation tolerance among angiosperm resurrection plant species
M. Vicré
,
J. Farrant
,
A. Driouich
2004
Corpus ID: 5035338
Water is a major limiting factor in growth and reproduction in plants. The ability of tissues to survive desiccation is commonly…
Expand
2004
2004
Adaptive cyberdefense for survival and intrusion tolerance
M. Atighetchi
,
P. Pal
,
F. Webber
,
R. Schantz
,
Christopher C. Jones
,
J. Loyall
IEEE Internet Computing
2004
Corpus ID: 7835772
While providing some resistance against cyberattacks, current approaches to securing networked and distributed information…
Expand
Review
1996
Review
1996
Whole plant adaptations to fluctuating water tables
R. Crawford
Folia Geobotanica
1996
Corpus ID: 33715338
Why some plants are damaged by flooding and others are not, is not a question that can be answered by citing any one particular…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE