Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Intrusion Tolerance). Showing records 1 – 21 of 21 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Universidade de Lisboa

1. Cogo, Vinicius Vielmo. Diversity in Automatic Cloud Computing Resource Selection.

Degree: 2011, Universidade de Lisboa

 Obtaining correct results and behaviour on computing is a long-standing concern. Such guarantee can be obtained through fault and intrusion tolerance mechanisms, which aim to… (more)

Subjects/Keywords: Diversity; Resource Management; Cloud Computing; Intrusion Tolerance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cogo, V. V. (2011). Diversity in Automatic Cloud Computing Resource Selection. (Thesis). Universidade de Lisboa. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13887

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cogo, Vinicius Vielmo. “Diversity in Automatic Cloud Computing Resource Selection.” 2011. Thesis, Universidade de Lisboa. Accessed November 18, 2019. http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13887.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cogo, Vinicius Vielmo. “Diversity in Automatic Cloud Computing Resource Selection.” 2011. Web. 18 Nov 2019.

Vancouver:

Cogo VV. Diversity in Automatic Cloud Computing Resource Selection. [Internet] [Thesis]. Universidade de Lisboa; 2011. [cited 2019 Nov 18]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13887.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cogo VV. Diversity in Automatic Cloud Computing Resource Selection. [Thesis]. Universidade de Lisboa; 2011. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13887

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade de Lisboa

2. Ferreira, Paulo Jorge Botelho. Diverse intrusion-tolerant database replication.

Degree: 2012, Universidade de Lisboa

 The combination of database replication with Byzantine fault tolerance mechanism is a recent field of research with projects appearing in the last few years. However… (more)

Subjects/Keywords: Replication; Diversity; Middleware; Intrusion Tolerance; Databases

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ferreira, P. J. B. (2012). Diverse intrusion-tolerant database replication. (Thesis). Universidade de Lisboa. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14036

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ferreira, Paulo Jorge Botelho. “Diverse intrusion-tolerant database replication.” 2012. Thesis, Universidade de Lisboa. Accessed November 18, 2019. http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14036.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ferreira, Paulo Jorge Botelho. “Diverse intrusion-tolerant database replication.” 2012. Web. 18 Nov 2019.

Vancouver:

Ferreira PJB. Diverse intrusion-tolerant database replication. [Internet] [Thesis]. Universidade de Lisboa; 2012. [cited 2019 Nov 18]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14036.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ferreira PJB. Diverse intrusion-tolerant database replication. [Thesis]. Universidade de Lisboa; 2012. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14036

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


George Mason University

3. Nagarajan, Ajay. Realizing Cyber Resilience with Hybrid Intrusion Tolerance Architectures .

Degree: 2017, George Mason University

 The current approach to security is based on perimeter defense and relies on firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS). These systems… (more)

Subjects/Keywords: Computer science; Cyber Resilience; Intrusion Tolerance; Proactive Recovery; Risk Mitigation; SCIT; Self-cleansing Intrusion Tolerance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nagarajan, A. (2017). Realizing Cyber Resilience with Hybrid Intrusion Tolerance Architectures . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/11309

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nagarajan, Ajay. “Realizing Cyber Resilience with Hybrid Intrusion Tolerance Architectures .” 2017. Thesis, George Mason University. Accessed November 18, 2019. http://hdl.handle.net/1920/11309.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nagarajan, Ajay. “Realizing Cyber Resilience with Hybrid Intrusion Tolerance Architectures .” 2017. Web. 18 Nov 2019.

Vancouver:

Nagarajan A. Realizing Cyber Resilience with Hybrid Intrusion Tolerance Architectures . [Internet] [Thesis]. George Mason University; 2017. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/1920/11309.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nagarajan A. Realizing Cyber Resilience with Hybrid Intrusion Tolerance Architectures . [Thesis]. George Mason University; 2017. Available from: http://hdl.handle.net/1920/11309

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade de Lisboa

4. Medeiros, Nuno André Carnido. A faut - and intrusion - tolerant architecture for EDP Distribuição scada system.

Degree: 2011, Universidade de Lisboa

 Over recent decades there has been a great investment in creating an infrastructure for energy distribution that offers a higher quality of service and also… (more)

Subjects/Keywords: Dependability; SCADA; Security; Fault Tolerance; Electricity Distribution; Intrusion Tolerance; GENESys

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Medeiros, N. A. C. (2011). A faut - and intrusion - tolerant architecture for EDP Distribuição scada system. (Thesis). Universidade de Lisboa. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13932

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Medeiros, Nuno André Carnido. “A faut - and intrusion - tolerant architecture for EDP Distribuição scada system.” 2011. Thesis, Universidade de Lisboa. Accessed November 18, 2019. http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13932.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Medeiros, Nuno André Carnido. “A faut - and intrusion - tolerant architecture for EDP Distribuição scada system.” 2011. Web. 18 Nov 2019.

Vancouver:

Medeiros NAC. A faut - and intrusion - tolerant architecture for EDP Distribuição scada system. [Internet] [Thesis]. Universidade de Lisboa; 2011. [cited 2019 Nov 18]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13932.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Medeiros NAC. A faut - and intrusion - tolerant architecture for EDP Distribuição scada system. [Thesis]. Universidade de Lisboa; 2011. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13932

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade de Lisboa

5. Moniz, Henrique Lícias Senra. Byzantine Fault-Tolerant Agreement Protocols for Wireless Ad hoc Networks.

Degree: 2014, Universidade de Lisboa

 The thesis investigates the problem of fault- and intrusion-tolerant consensus in resource-constrained wireless ad hoc networks. This is a fundamental problem in distributed computing because… (more)

Subjects/Keywords: fault tolerance intrusion tolerance; dependability; agreement; consensus; Distributed systems; wireless ad hoc networks; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moniz, H. L. S. (2014). Byzantine Fault-Tolerant Agreement Protocols for Wireless Ad hoc Networks. (Thesis). Universidade de Lisboa. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14305

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Moniz, Henrique Lícias Senra. “Byzantine Fault-Tolerant Agreement Protocols for Wireless Ad hoc Networks.” 2014. Thesis, Universidade de Lisboa. Accessed November 18, 2019. http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14305.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Moniz, Henrique Lícias Senra. “Byzantine Fault-Tolerant Agreement Protocols for Wireless Ad hoc Networks.” 2014. Web. 18 Nov 2019.

Vancouver:

Moniz HLS. Byzantine Fault-Tolerant Agreement Protocols for Wireless Ad hoc Networks. [Internet] [Thesis]. Universidade de Lisboa; 2014. [cited 2019 Nov 18]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14305.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Moniz HLS. Byzantine Fault-Tolerant Agreement Protocols for Wireless Ad hoc Networks. [Thesis]. Universidade de Lisboa; 2014. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14305

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade de Lisboa

6. Henriques, Miguel Garcia Tavares. Diversity Management in Intrusion Tolerant Systems.

Degree: 2011, Universidade de Lisboa

 One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security… (more)

Subjects/Keywords: Operating Systems; Intrusion Tolerance; Vulnerabilities; Proactive Recovery; Diversity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Henriques, M. G. T. (2011). Diversity Management in Intrusion Tolerant Systems. (Thesis). Universidade de Lisboa. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14061

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Henriques, Miguel Garcia Tavares. “Diversity Management in Intrusion Tolerant Systems.” 2011. Thesis, Universidade de Lisboa. Accessed November 18, 2019. http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14061.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Henriques, Miguel Garcia Tavares. “Diversity Management in Intrusion Tolerant Systems.” 2011. Web. 18 Nov 2019.

Vancouver:

Henriques MGT. Diversity Management in Intrusion Tolerant Systems. [Internet] [Thesis]. Universidade de Lisboa; 2011. [cited 2019 Nov 18]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14061.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Henriques MGT. Diversity Management in Intrusion Tolerant Systems. [Thesis]. Universidade de Lisboa; 2011. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14061

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

7. Wang, Hai. MODELING AND EVALUATING THE SURVIVABILITY OF AN INTRUSION TOLERANT DATABASE SYSTEM.

Degree: PhD, Information Sciences and Technology, 2007, Penn State University

 The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to overcome these vulnerabilities.… (more)

Subjects/Keywords: Intrusion Tolerance; Survivability; Database Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, H. (2007). MODELING AND EVALUATING THE SURVIVABILITY OF AN INTRUSION TOLERANT DATABASE SYSTEM. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/7886

Chicago Manual of Style (16th Edition):

Wang, Hai. “MODELING AND EVALUATING THE SURVIVABILITY OF AN INTRUSION TOLERANT DATABASE SYSTEM.” 2007. Doctoral Dissertation, Penn State University. Accessed November 18, 2019. https://etda.libraries.psu.edu/catalog/7886.

MLA Handbook (7th Edition):

Wang, Hai. “MODELING AND EVALUATING THE SURVIVABILITY OF AN INTRUSION TOLERANT DATABASE SYSTEM.” 2007. Web. 18 Nov 2019.

Vancouver:

Wang H. MODELING AND EVALUATING THE SURVIVABILITY OF AN INTRUSION TOLERANT DATABASE SYSTEM. [Internet] [Doctoral dissertation]. Penn State University; 2007. [cited 2019 Nov 18]. Available from: https://etda.libraries.psu.edu/catalog/7886.

Council of Science Editors:

Wang H. MODELING AND EVALUATING THE SURVIVABILITY OF AN INTRUSION TOLERANT DATABASE SYSTEM. [Doctoral Dissertation]. Penn State University; 2007. Available from: https://etda.libraries.psu.edu/catalog/7886


George Mason University

8. Nguyen, Quyen Luong. Quantitative Framework to Design Services with Intrusion Tolerant QoS .

Degree: 2014, George Mason University

 Large software systems can be designed as a set of loosely coupled services interacting with each other; simple services can be composed to form more… (more)

Subjects/Keywords: Computer science; Attack Surface; Intrusion Tolerance; IT-QoS; SCIT; Semi-Markov

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nguyen, Q. L. (2014). Quantitative Framework to Design Services with Intrusion Tolerant QoS . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/8925

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nguyen, Quyen Luong. “Quantitative Framework to Design Services with Intrusion Tolerant QoS .” 2014. Thesis, George Mason University. Accessed November 18, 2019. http://hdl.handle.net/1920/8925.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nguyen, Quyen Luong. “Quantitative Framework to Design Services with Intrusion Tolerant QoS .” 2014. Web. 18 Nov 2019.

Vancouver:

Nguyen QL. Quantitative Framework to Design Services with Intrusion Tolerant QoS . [Internet] [Thesis]. George Mason University; 2014. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/1920/8925.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nguyen QL. Quantitative Framework to Design Services with Intrusion Tolerant QoS . [Thesis]. George Mason University; 2014. Available from: http://hdl.handle.net/1920/8925

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

9. Al-Hamadi, Hamid Helal. Dynamic Redundancy Management of Multisource Multipath Routing Integrated with Voting-based Intrusion Detection in Wireless Sensor Networks.

Degree: PhD, Computer Science, 2014, Virginia Tech

 Wireless sensor networks (WSNs) are frequently deployed unattended and can be easily captured or compromised. Once compromised, intrusion prevention methods such as encryption can no… (more)

Subjects/Keywords: Wireless sensor networks; multisource multipath routing; dynamic redundancy management; energy conservation; reliability; security; intrusion detection; intrusion tolerance; performance analysis.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Hamadi, H. H. (2014). Dynamic Redundancy Management of Multisource Multipath Routing Integrated with Voting-based Intrusion Detection in Wireless Sensor Networks. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/47681

Chicago Manual of Style (16th Edition):

Al-Hamadi, Hamid Helal. “Dynamic Redundancy Management of Multisource Multipath Routing Integrated with Voting-based Intrusion Detection in Wireless Sensor Networks.” 2014. Doctoral Dissertation, Virginia Tech. Accessed November 18, 2019. http://hdl.handle.net/10919/47681.

MLA Handbook (7th Edition):

Al-Hamadi, Hamid Helal. “Dynamic Redundancy Management of Multisource Multipath Routing Integrated with Voting-based Intrusion Detection in Wireless Sensor Networks.” 2014. Web. 18 Nov 2019.

Vancouver:

Al-Hamadi HH. Dynamic Redundancy Management of Multisource Multipath Routing Integrated with Voting-based Intrusion Detection in Wireless Sensor Networks. [Internet] [Doctoral dissertation]. Virginia Tech; 2014. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/10919/47681.

Council of Science Editors:

Al-Hamadi HH. Dynamic Redundancy Management of Multisource Multipath Routing Integrated with Voting-based Intrusion Detection in Wireless Sensor Networks. [Doctoral Dissertation]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/47681


Cleveland State University

10. Chen, Bo. Byzantine Fault Tolerance for Nondeterministic Applications.

Degree: MSin Electrical Engineering, Fenn College of Engineering, 2008, Cleveland State University

 The growing reliance on online services accessible on the Internet demands highly reliable system that would not be interrupted when encountering faults. A number of… (more)

Subjects/Keywords: Computer Science; Byzantine fault tolerance; replica nondeterminism; security; replica consistency; replication; intrusion tolerance; performance; online poker game

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, B. (2008). Byzantine Fault Tolerance for Nondeterministic Applications. (Masters Thesis). Cleveland State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=csu1231600826

Chicago Manual of Style (16th Edition):

Chen, Bo. “Byzantine Fault Tolerance for Nondeterministic Applications.” 2008. Masters Thesis, Cleveland State University. Accessed November 18, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=csu1231600826.

MLA Handbook (7th Edition):

Chen, Bo. “Byzantine Fault Tolerance for Nondeterministic Applications.” 2008. Web. 18 Nov 2019.

Vancouver:

Chen B. Byzantine Fault Tolerance for Nondeterministic Applications. [Internet] [Masters thesis]. Cleveland State University; 2008. [cited 2019 Nov 18]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=csu1231600826.

Council of Science Editors:

Chen B. Byzantine Fault Tolerance for Nondeterministic Applications. [Masters Thesis]. Cleveland State University; 2008. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=csu1231600826


Universidade Federal do Maranhão

11. Lindonete Gonçalves Siqueira. Tolerance the Imperfections for the NIDIA: a Detection system of Intrusion Based on Intelligent Agents.

Degree: 2006, Universidade Federal do Maranhão

An Intrusion Detection System (IDS) is one tool among several existing ones to provide safety to a computational system. The IDS has the objective of… (more)

Subjects/Keywords: Segurança; Detecção de Intrusão; Multiagent System; Reliability; Security; Confiabilidade; Intrusion Detection; Fault Tolerance; CIENCIA DA COMPUTACAO; Tolerância a Falhas; Sistema Multiagente

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Siqueira, L. G. (2006). Tolerance the Imperfections for the NIDIA: a Detection system of Intrusion Based on Intelligent Agents. (Thesis). Universidade Federal do Maranhão. Retrieved from http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=29

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Siqueira, Lindonete Gonçalves. “Tolerance the Imperfections for the NIDIA: a Detection system of Intrusion Based on Intelligent Agents.” 2006. Thesis, Universidade Federal do Maranhão. Accessed November 18, 2019. http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=29.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Siqueira, Lindonete Gonçalves. “Tolerance the Imperfections for the NIDIA: a Detection system of Intrusion Based on Intelligent Agents.” 2006. Web. 18 Nov 2019.

Vancouver:

Siqueira LG. Tolerance the Imperfections for the NIDIA: a Detection system of Intrusion Based on Intelligent Agents. [Internet] [Thesis]. Universidade Federal do Maranhão; 2006. [cited 2019 Nov 18]. Available from: http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=29.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Siqueira LG. Tolerance the Imperfections for the NIDIA: a Detection system of Intrusion Based on Intelligent Agents. [Thesis]. Universidade Federal do Maranhão; 2006. Available from: http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=29

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade de Lisboa

12. Sousa, Paulo. Proactive Resilience.

Degree: 2007, Universidade de Lisboa

 This thesis introduces a new dimension over which systems dependability may be evaluated, exhaustion-safety. Exhaustion-safety means safety against resource exhaustion, and its concrete semantics in… (more)

Subjects/Keywords: Distributed systems; dependability; security; intrusion-tolerance; availability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sousa, P. (2007). Proactive Resilience. (Thesis). Universidade de Lisboa. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14298

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sousa, Paulo. “Proactive Resilience.” 2007. Thesis, Universidade de Lisboa. Accessed November 18, 2019. http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14298.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sousa, Paulo. “Proactive Resilience.” 2007. Web. 18 Nov 2019.

Vancouver:

Sousa P. Proactive Resilience. [Internet] [Thesis]. Universidade de Lisboa; 2007. [cited 2019 Nov 18]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14298.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sousa P. Proactive Resilience. [Thesis]. Universidade de Lisboa; 2007. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14298

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade Nova

13. Almeida, João Carlos Andrade de. Intrusion tolerant routing with data consensus in wireless sensor networks.

Degree: 2013, Universidade Nova

Dissertação para obtenção do Grau de Mestre em Engenharia Informática

Wireless sensor networks (WSNs) are rapidly emerging and growing as an important new area in… (more)

Subjects/Keywords: Wireless sensor networks (WSN); Routing services and protocols for WSN; Reliability; Consensus protocols; Intrusion tolerance; Simulation environments for WSN

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Almeida, J. C. A. d. (2013). Intrusion tolerant routing with data consensus in wireless sensor networks. (Thesis). Universidade Nova. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/10831

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Almeida, João Carlos Andrade de. “Intrusion tolerant routing with data consensus in wireless sensor networks.” 2013. Thesis, Universidade Nova. Accessed November 18, 2019. http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/10831.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Almeida, João Carlos Andrade de. “Intrusion tolerant routing with data consensus in wireless sensor networks.” 2013. Web. 18 Nov 2019.

Vancouver:

Almeida JCAd. Intrusion tolerant routing with data consensus in wireless sensor networks. [Internet] [Thesis]. Universidade Nova; 2013. [cited 2019 Nov 18]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/10831.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Almeida JCAd. Intrusion tolerant routing with data consensus in wireless sensor networks. [Thesis]. Universidade Nova; 2013. Available from: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/10831

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade de Lisboa

14. Correia, Miguel. Intrusion Tolerance based on Architectural Hybridization.

Degree: 2003, Universidade de Lisboa

 Security in distributed computing systems is usually based on the idea of prevention. The usual approach consists in trying to design perfect systems, with no… (more)

Subjects/Keywords: distributed systems; intrusion tolerance; group communication; dependability, security; Byzantine fault tolerance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Correia, M. (2003). Intrusion Tolerance based on Architectural Hybridization. (Thesis). Universidade de Lisboa. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14292

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Correia, Miguel. “Intrusion Tolerance based on Architectural Hybridization.” 2003. Thesis, Universidade de Lisboa. Accessed November 18, 2019. http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14292.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Correia, Miguel. “Intrusion Tolerance based on Architectural Hybridization.” 2003. Web. 18 Nov 2019.

Vancouver:

Correia M. Intrusion Tolerance based on Architectural Hybridization. [Internet] [Thesis]. Universidade de Lisboa; 2003. [cited 2019 Nov 18]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14292.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Correia M. Intrusion Tolerance based on Architectural Hybridization. [Thesis]. Universidade de Lisboa; 2003. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14292

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade de Lisboa

15. Moniz, Henrique Lícias Senra. Randomized intrusion-tolerant asynchronous services.

Degree: 2006, Universidade de Lisboa

Randomized agreement protocols have been around for more than two decades. Often assumed to be inefficient due to their high expected communication and time complexities,… (more)

Subjects/Keywords: Intrusion tolerance; Byzantine agreement; Randomized algorithms; Performance evaluation; Teses de mestrado - 2006

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moniz, H. L. S. (2006). Randomized intrusion-tolerant asynchronous services. (Thesis). Universidade de Lisboa. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14027

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Moniz, Henrique Lícias Senra. “Randomized intrusion-tolerant asynchronous services.” 2006. Thesis, Universidade de Lisboa. Accessed November 18, 2019. http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14027.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Moniz, Henrique Lícias Senra. “Randomized intrusion-tolerant asynchronous services.” 2006. Web. 18 Nov 2019.

Vancouver:

Moniz HLS. Randomized intrusion-tolerant asynchronous services. [Internet] [Thesis]. Universidade de Lisboa; 2006. [cited 2019 Nov 18]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14027.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Moniz HLS. Randomized intrusion-tolerant asynchronous services. [Thesis]. Universidade de Lisboa; 2006. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14027

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Iowa State University

16. Gerdes, Ryan. Physical layer identification: methodology, security, and origin of variation.

Degree: 2011, Iowa State University

 It is common practice to limit solutions for most problems in computer and network security to the purview of the digital domain. Certainly, digital solutions… (more)

Subjects/Keywords: Device Identification; Hardware and devices; Intrusion prevention and tolerance; Network security; Physical Layer Identification; Signal and Data Authentication; Electrical and Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gerdes, R. (2011). Physical layer identification: methodology, security, and origin of variation. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/10257

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gerdes, Ryan. “Physical layer identification: methodology, security, and origin of variation.” 2011. Thesis, Iowa State University. Accessed November 18, 2019. https://lib.dr.iastate.edu/etd/10257.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gerdes, Ryan. “Physical layer identification: methodology, security, and origin of variation.” 2011. Web. 18 Nov 2019.

Vancouver:

Gerdes R. Physical layer identification: methodology, security, and origin of variation. [Internet] [Thesis]. Iowa State University; 2011. [cited 2019 Nov 18]. Available from: https://lib.dr.iastate.edu/etd/10257.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gerdes R. Physical layer identification: methodology, security, and origin of variation. [Thesis]. Iowa State University; 2011. Available from: https://lib.dr.iastate.edu/etd/10257

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

17. Thakore, Uttam. A quantitative methodology for evaluating and deploying security monitors.

Degree: MS, Computer Science, 2015, University of Illinois – Urbana-Champaign

 Despite advances in intrusion detection and prevention systems, attacks on networked computer systems continue to succeed. Intrusion tolerance and forensic analysis are required to adequately… (more)

Subjects/Keywords: computer security; monitoring; monitor deployment; monitor placement; intrusion tolerance; intrusion detection; Metrics; modeling; digital forensics

…attacks that succeed. Intrusion tolerance, which emerged from the field of fault tolerance… …elements of intrusion tolerance, not only preventing as many attacks as possible, but also… …system. Even with the absolute best intrusion tolerance system, however, it is impossible to… …monitored, or closed. We identify the following components of intrusion tolerance: collection of… …used to analyze the data. Ultimately, however, for intrusion tolerance and forensics analysis… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Thakore, U. (2015). A quantitative methodology for evaluating and deploying security monitors. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/88103

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Thakore, Uttam. “A quantitative methodology for evaluating and deploying security monitors.” 2015. Thesis, University of Illinois – Urbana-Champaign. Accessed November 18, 2019. http://hdl.handle.net/2142/88103.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Thakore, Uttam. “A quantitative methodology for evaluating and deploying security monitors.” 2015. Web. 18 Nov 2019.

Vancouver:

Thakore U. A quantitative methodology for evaluating and deploying security monitors. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2015. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/2142/88103.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Thakore U. A quantitative methodology for evaluating and deploying security monitors. [Thesis]. University of Illinois – Urbana-Champaign; 2015. Available from: http://hdl.handle.net/2142/88103

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade Nova

18. Guerreiro, André Ivo Azevedo. Intrusion Tolerant Routing Protocols for Wireless Sensor Networks.

Degree: 2011, Universidade Nova

 This MSc thesis is focused in the study, solution proposal and experimental evaluation of security solutions for Wireless Sensor Networks (WSNs). The objectives are centered… (more)

Subjects/Keywords: Wireless Sensor Networks; WSN simulation environments; large scale multi-hop WSNs; Secure Routing; Ad-hoc topology management; Intrusion tolerance and Network resilience; Domínio/Área Científica::Engenharia e Tecnologia::Engenharia Eletrotécnica, Eletrónica e Informática

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Guerreiro, A. I. A. (2011). Intrusion Tolerant Routing Protocols for Wireless Sensor Networks. (Thesis). Universidade Nova. Retrieved from https://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/37533

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Guerreiro, André Ivo Azevedo. “Intrusion Tolerant Routing Protocols for Wireless Sensor Networks.” 2011. Thesis, Universidade Nova. Accessed November 18, 2019. https://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/37533.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Guerreiro, André Ivo Azevedo. “Intrusion Tolerant Routing Protocols for Wireless Sensor Networks.” 2011. Web. 18 Nov 2019.

Vancouver:

Guerreiro AIA. Intrusion Tolerant Routing Protocols for Wireless Sensor Networks. [Internet] [Thesis]. Universidade Nova; 2011. [cited 2019 Nov 18]. Available from: https://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/37533.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Guerreiro AIA. Intrusion Tolerant Routing Protocols for Wireless Sensor Networks. [Thesis]. Universidade Nova; 2011. Available from: https://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/37533

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of South Africa

19. Zielinski, Marek Piotr. Applying mobile agents in an immune-system-based intrusion detection system .

Degree: 2009, University of South Africa

 Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. In such an architecture, the root node is responsible for detecting intrusions… (more)

Subjects/Keywords: Computer security; Intrusion detection system; Immune system; Mobile agent; Fault-tolerance; Anomaly detection; System call monitoring; Computer immunology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zielinski, M. P. (2009). Applying mobile agents in an immune-system-based intrusion detection system . (Masters Thesis). University of South Africa. Retrieved from http://hdl.handle.net/10500/1918

Chicago Manual of Style (16th Edition):

Zielinski, Marek Piotr. “Applying mobile agents in an immune-system-based intrusion detection system .” 2009. Masters Thesis, University of South Africa. Accessed November 18, 2019. http://hdl.handle.net/10500/1918.

MLA Handbook (7th Edition):

Zielinski, Marek Piotr. “Applying mobile agents in an immune-system-based intrusion detection system .” 2009. Web. 18 Nov 2019.

Vancouver:

Zielinski MP. Applying mobile agents in an immune-system-based intrusion detection system . [Internet] [Masters thesis]. University of South Africa; 2009. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/10500/1918.

Council of Science Editors:

Zielinski MP. Applying mobile agents in an immune-system-based intrusion detection system . [Masters Thesis]. University of South Africa; 2009. Available from: http://hdl.handle.net/10500/1918

20. Cunha, Hugo Assis. An architecture to resilient and highly available identity providers based on OpenID standard.

Degree: 2014, Universidade Federal do Amazonas

Secure authentication services and systems typically are based on two main approaches: the first one seeks to defend itself of all kind of attack. Actually,… (more)

Subjects/Keywords: Tolerância a faltas e intrusões; Sistemas resilientes; Replicação de máquinas de estado; Fault and intrusion tolerance; Resilient systems; State machine replication; Authentication and authorization infra-structures; OpenID; CIÊNCIAS EXATAS E DA TERRA: CIÊNCIA DA COMPUTAÇÃO

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cunha, H. A. (2014). An architecture to resilient and highly available identity providers based on OpenID standard. (Masters Thesis). Universidade Federal do Amazonas. Retrieved from http://tede.ufam.edu.br/handle/handle/4431

Chicago Manual of Style (16th Edition):

Cunha, Hugo Assis. “An architecture to resilient and highly available identity providers based on OpenID standard.” 2014. Masters Thesis, Universidade Federal do Amazonas. Accessed November 18, 2019. http://tede.ufam.edu.br/handle/handle/4431.

MLA Handbook (7th Edition):

Cunha, Hugo Assis. “An architecture to resilient and highly available identity providers based on OpenID standard.” 2014. Web. 18 Nov 2019.

Vancouver:

Cunha HA. An architecture to resilient and highly available identity providers based on OpenID standard. [Internet] [Masters thesis]. Universidade Federal do Amazonas; 2014. [cited 2019 Nov 18]. Available from: http://tede.ufam.edu.br/handle/handle/4431.

Council of Science Editors:

Cunha HA. An architecture to resilient and highly available identity providers based on OpenID standard. [Masters Thesis]. Universidade Federal do Amazonas; 2014. Available from: http://tede.ufam.edu.br/handle/handle/4431


University of Arizona

21. Rajagopalan, Mohan. Optimizing System Performance and Dependability Using Compiler Techniques .

Degree: 2006, University of Arizona

 As systems become more complex, there are increasing demands for improvement with respect to attributes such as performance, dependability, and security. Optimization is defined as… (more)

Subjects/Keywords: Operating Systems; Compiler Optimization; Program Analysis; Performance Optimization; Security and Intrusion Tolerance; Holistic System Optimization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rajagopalan, M. (2006). Optimizing System Performance and Dependability Using Compiler Techniques . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/194402

Chicago Manual of Style (16th Edition):

Rajagopalan, Mohan. “Optimizing System Performance and Dependability Using Compiler Techniques .” 2006. Doctoral Dissertation, University of Arizona. Accessed November 18, 2019. http://hdl.handle.net/10150/194402.

MLA Handbook (7th Edition):

Rajagopalan, Mohan. “Optimizing System Performance and Dependability Using Compiler Techniques .” 2006. Web. 18 Nov 2019.

Vancouver:

Rajagopalan M. Optimizing System Performance and Dependability Using Compiler Techniques . [Internet] [Doctoral dissertation]. University of Arizona; 2006. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/10150/194402.

Council of Science Editors:

Rajagopalan M. Optimizing System Performance and Dependability Using Compiler Techniques . [Doctoral Dissertation]. University of Arizona; 2006. Available from: http://hdl.handle.net/10150/194402

.