Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously comprom...
Anh Nguyen-Tuong, David Evans, John C. Knight, Ben...
In this paper, we study block codes that are optimized to recover some lost source data even in case when full recovery is not possible. Conventionally, block codes designed for p...
In this paper we present FailRank, a novel framework for integrating and ranking information sources that characterize failures in a grid system. After the failing sites have been...
Abstract—System availability is difficult for systems to maintain in the face of Internet worms. Large systems have vulnerabilities, and if a system attempts to continue operati...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
In this study, we propose ARF-aware TCP that resolves the performance anomaly in 802.11 WLAN networks. Performance anomaly is a network symptom that fairness among the nodes is bro...