: Mass customization has become one of the key strategies for a service provider to differentiate itself from its competitors in a highly segmented global service market. This pape...
Jian Cao, Jie Wang, Kincho H. Law, Shen-sheng Zhan...
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant ...
eXpert-BSM is a real time forward-reasoning expert system that analyzes Sun Solaris audit trails. Based on many years of intrusion detection research, eXpert-BSM's knowledge ...
End-to-end predictability of operations is essential for many fixed-priority distributed real-time and embedded (DRE) applications, such as command and control systems, manufactu...