ResMon: Securing Resource Consumption of Critical Infrastructure from Wanton Applications

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges

Das, Kant and Zhang have done a brilliant job editing Securing Cyber-Physical Critical Infrastructure, bringing together a who’s who list of researchers and practitioners. Das is a University distinguished Scholar Professor of Computer Science and Engineering at the University of Texas Arlington with more than 500 published papers, three books and the editorship at Elsevier’s Pervasive and Mobi...

متن کامل

Infrastructure for Securing IoT

The demands on metropolitan wireless networks is likely to change dramatically over the coming years due to the emergence of new applications and devices. The network infrastructure will need to adapt to meet these changing demands. In order to design the future infrastructure, we must first understand these workload trends and the applications that create them. In this white paper, we focus on...

متن کامل

Hyper-Converged Infrastructure for Business Critical Applications

Customers deploying Business Critical Applications (BCAs) have requirements such as stringent SLAs, sustained high performance, and continued application availability. It is a major challenge for organizations to manage data storage in these environments. Common issues in using traditional storage solutions for BCAs include inadequate performance, storage inefficiency, difficulty to scale, comp...

متن کامل

Securing SDN Infrastructure of IoT-Fog Networks From MitM Attacks

While the IoT is making our lives much easier, managing the IoT becomes a big issue due to the huge number of connections, and the lack of protections for devices. Recent work shows that Software-defined Networking (SDN) has a great capability in automatically and dynamically managing network flows. Besides, switches in SDNs are usually powerful machines, which can be used as fog nodes simultan...

متن کامل

sSCADA: securing SCADA infrastructure communications

Distributed control systems (DCS) and supervisory control and data acquisition (SCADA) systems were developed to reduce labour costs, and to allow system-wide monitoring and remote control from a central location. Control systems are widely used in critical infrastructures such as electric grid, natural gas, water and wastewater industries. While control systems can be vulnerable to a variety o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2016

ISSN: 0975-8887

DOI: 10.5120/ijca2016908814