Hybrid recovery-based intrusion tolerant system for practical cyber-defense

B Jang, S Doo, S Lee, H Yoon - IEICE TRANSACTIONS on …, 2016 - search.ieice.org
Due to the periodic recovery of virtual machines regardless of whether malicious intrusions
exist, proactive recovery-based Intrusion Tolerant Systems (ITSs) are being considered for …

Interface díodo

HDM Sousa - 2013 - repositorio.ul.pt
Com o constante crescimento dos serviços online, as interações realizadas por utilizadores
ou servidores que se encontram numa rede com baixo nível de segurança (eg Internet) com …

[PDF][PDF] D5. 1.4-Resilient SIEM Framework Architecture, Services and Protocols

C Di Sarno, A Mazzeo, N Mazzocca, R Rieke… - 2011 - Citeseer
Executive Summary Security Information and Event Management (SIEM) systems are being
employed by organizations to facilitate operations related to maintenance, monitoring and …

[PDF][PDF] D5. 1.2-Preliminary Defense Services and Protocols

C Di Sarno, N Kuntze, P Verissimo, R Fonseca… - 2011 - Citeseer
Executive Summary Security Information and Event Management (SIEM) systems offer
various capabilities for real-time event collection by monitoring a network at a diverse set of …