Login / Signup

Redundancy-based intrusion tolerance approaches moving from classical fault tolerance methods.

Felicita Di GiandomenicoGiulio MasettiSilvano Chiaradonna
Published in: Int. J. Appl. Math. Comput. Sci. (2022)
Keyphrases
  • fault tolerance
  • fault tolerant
  • distributed systems
  • high availability
  • response time
  • data mining techniques
  • cooperative
  • intrusion detection
  • intrusion detection system
  • database replication