نتایج جستجو برای: survivability

تعداد نتایج: 3131  

2010
Arun Kumar Lokanatha C. Reddy Prakash S. Hiremath

The survivability of the network is closely related to the connectivity of the network. For many network applications such as a sensor network/ad hoc network for battlefield monitoring or wild fire tracking etc., survivability is one of most important requirements, and therefore a number of related problems are proposed. In this paper we study the survivability with respect to multicast route f...

2015
John Knight Dennis M. Heimbigner Alexander L. Wolf Antonio Carzaniga Dennis Heimbigner Jonathan Hill Premkumar Devanbu Michael Gertz

The Willow architecture is a comprehensive approach to survivability in critical distributed applications. Survivability is achieved in a deployed system using a unique combination of (a) fault avoidance by disabling vulnerable network elements intentionally when a threat is detected or predicted, (b) fault elimination by replacing system software elements when faults are discovered, and (c) fa...

2011
Tina Erlandsson Lars Niklasson

When flying a mission, a fighter pilot is exposed to the risk of being hit by enemy fire. A tactical support system can aid the pilot by calculating the survivability of a given route, which is the probability that the fighter pilot can fly the route without being hit. The survivability estimate will be uncertain due to uncertainty in the information about threats in the area. In this paper, we...

2013
Hongsong CHEN Xuewei SHANG Fei YE

Network survivability is the key ability of ad hoc network under all kinds of attacks, which is a foundation to the design and evaluation of wireless ad hoc network routing protocol. The definitions of network survivability are analyzed and compared. We propose a novel survivability model based on Finite State Machine (FSM) and District Time Markov Chain (DTMC) model. DTMC steady-state probabil...

2001
Paul R. Muessig

The Susceptibility Model Assessment and Range Test (SMART) Project was commissioned in FY92 to develop, test and transition to DoD a proven and efficient credibility assessment process for joint-use aircraft survivability models and simulations (M&S) currently supporting major weapons system acquisition and testing decisions. SMART is sponsored by the Joint Technical Coordinating Group for Airc...

2013
Ruchika Mehresh Shambhu J. Upadhyaya Murat Demirbas

Mission critical systems are prevalent in the military and industry which renders them attractive as targets for security attacks. Their constantly increasing structural complexity contributes to benign faults and further facilitates malicious entities. Over the years, these malicious entities in cyber-space have grown smarter and extremely resourceful. Advanced persistent threat (APT) is a cle...

2005
William H. Sanders

There is a growing need for systems whose survivability in a specified use and/or attack environment can be assured with confidence. Many techniques have been proposed to validate individual components (e.g., formal methods) or a system as a whole (e.g., red teaming). However, no single technique can provide the breadth of evidence needed to validate a system with respect to high-level survivab...

1999
Philip L Campbell

Meanwhile, there is at least one additional front in the survivability battle, this one involving “control objectives.” This is a relatively humdrum front, exciting to accountants possibly but not to super heros. However, the more fronts we can open, the more opportunities we have to push the conflict to our favor. This paper defines control objectives, explains their strengths—good practice, c...

1998
Ananth Nagarajan Vatsala Nagarajan

Recent advances in fiber optics technology have enabled extremely highspeed transport of different forms of data, on multiple wavelengths of an optical fiber, using Dense Wavelength Division Multiplexing (DWDM). It has now become possible to deploy high-speed, multi-service networks using DWDM technology. Many transport network architectures that employ advanced fiber optic technology have been...

1997
Crispin Cowan Jon Inouye Lakshmi Kethana Jonathan Walpole

In large-scale systems such as the Internet, the means to exploit security aws can be readily distributed, exposing a large number of systems to vulnerability. This problem is aggravated if system implementations are both xed and widely distributed. For instance, the fact that sendmail 8.7.5 has a particular vulnerability 1] can be used by numerous intruders to attack many systems. These attack...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید