Towards autonomic network management: an analysis of current and future research directions

N Samaan, A Karmouch - IEEE Communications Surveys & …, 2009 - ieeexplore.ieee.org
Autonomic network management is an innovative vision promising new horizons of efficient
networking systems free from human control. This promise has, thus far, ushered in …

Methods and geometry for plane-based self-calibration

P Gurdjos, P Sturm - 2003 IEEE Computer Society Conference …, 2003 - ieeexplore.ieee.org
We consider the problem of camera self-calibration from images of a planar object with
unknown Euclidean structure. The general case of possibly varying focal length is …

A model-based validated autonomic approach to self-protect computing systems

Q Chen, S Abdelwahed, A Erradi - IEEE Internet of things …, 2014 - ieeexplore.ieee.org
This paper introduces an autonomic model-based cyber security management approach for
the Internet of Things (IoT) ecosystems. The approach aims at realizing a self-protecting …

A model-based approach to self-protection in computing system

Q Chen, S Abdelwahed, A Erradi - Proceedings of the 2013 ACM Cloud …, 2013 - dl.acm.org
This paper introduces a model-based autonomic security management (ASM) approach to
estimate, detect and identify security attacks along with planning a sequence of actions to …

Anomaly-based behavior analysis of wireless network security

S Fayssal, S Hariri, Y Al-Nashif - 2007 Fourth Annual …, 2007 - ieeexplore.ieee.org
The exponential growth in wireless network faults, vulnerabilities, and attacks make the
wireless local area network (WLAN) security management a challenging research area …

Enabling technologies for self-aware adaptive systems

MD Santambrogio, H Hoffmann… - 2010 NASA/ESA …, 2010 - ieeexplore.ieee.org
Self-aware computer systems will be capable of adapting their behavior and resources
thousands of times a second to automatically find the best way to accomplish a given goal …

Defeating the insider threat via autonomic network capabilities

FM Sibai, DA Menascé - 2011 Third International Conference …, 2011 - ieeexplore.ieee.org
There has been a constant growing security concern on insider attacks on network
accessible computer systems. Users with power credentials can do almost anything they …

Multivariate fuzzy analysis for Mobile ad hoc Network threat Detection

SK Alampalayam, EF Natsheh - International Journal of Business …, 2008 - igi-global.com
Detection of malicious, compromised and selfish node attacks is urgently needed to protect
Mobile Ad hoc Networks (MANET) and their applications from failures. Once a MANET …

[PDF][PDF] 网络保护质量研究

林闯, 肖岩平, 王元卓, 曾荣飞 - 2008 - cjc.ict.ac.cn
摘要随着人们的网络安全意识不断增强, 迫切需要一套可度量, 可量化的指标来评价系统安全
保护的质量. 作为网络安全领域的一个新概念, 网络保护质量(QualityofProtection, QoP) …

An autonomic framework for integrating security and quality of service support in databases

F Alomari, DA Menasce - 2012 IEEE Sixth International …, 2012 - ieeexplore.ieee.org
The back-end databases of multi-tiered applications are a major data security concern for
enterprises. The problem becomes more critical with the proliferation of enterprise hosted …