All Fields
Computer Science
Medicine
FAQ
Contact
Sign in
Intrusion tolerance
Intrusion tolerance is a fault-tolerant design approach to defending information systems against malicious attack. Abandoning the conventional aim of…Â
(More)
Wikipedia
Topic mentions per year
Topic mentions per year
1986-2017
0
10
20
1986
2017
Related topics
Related topics
4 relations
Byzantine fault tolerance
Fault-tolerant computer system
Broader (2)
Computer security
Fault tolerance
Related mentions per year
Related mentions per year
1955-2018
1960
1980
2000
2020
Intrusion tolerance
Fault tolerance
Computer security
Byzantine fault tolerance
Fault-tolerant computer system
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Intrusion Tolerance of Stealth DoS Attacks to Web Services
Massimo Ficco
,
Massimiliano Rak
SEC
2012
This paper focuses on one of the most harmful categories of Denial of Service attacks, commonly known in the literature as…Â
(More)
Is this relevant?
2011
2011
OS diversity for intrusion tolerance: Myth or reality?
Miguel Garcia
,
Alysson Neves Bessani
,
Ilir Gashi
,
Nuno Ferreira Neves
,
Rafael R. Obelheiro
2011 IEEE/IFIP 41st International Conference on…
2011
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of…Â
(More)
Is this relevant?
2006
2006
Incorruptible system self-cleansing for intrusion tolerance
Yih Huang
,
David Arsenault
,
Arun K. Sood
2006 IEEE International Performance Computing and…
2006
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in…Â
(More)
Is this relevant?
2006
2006
Internet Security: An Intrusion-Tolerance Approach
Yves Deswarte
,
David Powell
Proceedings of the IEEE
2006
The Internet has become essential to most enterprises and many private individuals. However, both the network and computer…Â
(More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks
Jing Deng
,
Richard Han
,
Shivakant Mishra
International Conference on Dependable Systems…
2004
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure…Â
(More)
Is this relevant?
2004
2004
Adaptive cyberdefense for survival and intrusion tolerance
Michael Atighetchi
,
Partha P. Pal
,
Franklin Webber
,
Richard E. Schantz
,
Christopher C. Jones
,
Joseph P. Loyall
IEEE Internet Computing
2004
While providing some resistance against cyberattacks, current approaches to securing networked and distributed information…Â
(More)
Is this relevant?
2004
2004
Constructing detection knowledge for DDoS intrusion tolerance
Shun-Chieh Lin
,
Shian-Shyong Tseng
Expert Syst. Appl.
2004
Intrusion tolerance is the ability of a system to continue providing (possibly degraded but) adequate services after a…Â
(More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Intrusion-Tolerant Architectures: Concepts and Design
Paulo VerÃssimo
,
Nuno Ferreira Neves
,
Miguel Correia
WADS
2002
There is a significant body of research on distributed computing architectures, methodologies and algorithms, both in the fields…Â
(More)
Is this relevant?
Highly Cited
1991
Highly Cited
1991
Intrusion Tolerance in Distributed Computing Systems
Yves Deswarte
,
Laurent Blain
,
Jean-Charles Fabre
IEEE Symposium on Security and Privacy
1991
An intrusion-tolerant distributed system is a system which is designed so that any intrusion into a part of the system will not…Â
(More)
Is this relevant?
1986
1986
Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering
J.-M. Fray
,
Yves Deswarte
,
David Powell
1986 IEEE Symposium on Security and Privacy
1986
The consequences of faults and intrusions in computer networks are of ever-increasing importance; new efficient techniques are…Â
(More)
Is this relevant?