Login / Signup
On the reliability and availability of replicated and rejuvenating systems under stealth attacks and intrusions.
Luís Teixeira d'Aguiar Norton Brandao
Alysson Neves Bessani
Published in:
J. Braz. Comput. Soc. (2012)
Keyphrases
</>
malicious attacks
data mining
information retrieval
distributed systems
intrusion detection system
fault tolerant
database
data sets
case study
expert systems
software engineering
fault tolerance
watermarking scheme
network intrusion detection systems