Skip to search formSkip to main contentSkip to account menu

Intrusion tolerance

Intrusion tolerance is a fault-tolerant design approach to defending information systems against malicious attack. Abandoning the conventional aim of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2022
2022
  • D. Gaff
  • 2022
  • Corpus ID: 146032819
Highly Cited
2010
Highly Cited
2010
[1] The Campi Flegrei volcanic district, in southern Italy, has been uplifted since 1968 by a net maximum of 3 m during the… 
Highly Cited
2008
Highly Cited
2008
Broad tolerance to phytophthora root rot (PRR) caused by Phytophthora sojae has become an important goal for the improvement of… 
Review
2006
Review
2006
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their… 
Highly Cited
2005
Highly Cited
2005
The OMG's Real‐Time CORBA (RT‐CORBA) and Fault‐Tolerant CORBA (FT‐CORBA) specifications make it possible for today's CORBA… 
Highly Cited
2004
Highly Cited
2004
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure… 
Review
2004
Review
2004
Water is a major limiting factor in growth and reproduction in plants. The ability of tissues to survive desiccation is commonly… 
2004
2004
While providing some resistance against cyberattacks, current approaches to securing networked and distributed information… 
Review
1996
Review
1996
Why some plants are damaged by flooding and others are not, is not a question that can be answered by citing any one particular…