Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2014 | 14 | 1 |
Tytuł artykułu

Information security of critical application data processing systems

Treść / Zawartość
Warianty tytułu
Informacionnaja bezopasnost kriticheski vazhnykh sisyem obrabotki informacii
Języki publikacji
Opis fizyczny
  • Department of Economic Cybernetics, Lugansk National Agrarian University, Town LNAU, Lugansk, 91000, Ukraine
  • 1. Ahmad D., Dubrovskiy A., Flinn Х., 2005.: Defense from the hackers of corporate networks. Trudged. with angl. – 2th izd. M.: Companies AyTi, DMK - Press. 864. (in Russian).
  • 2. Atighetchi M., Pal P., Webber F., Schantz R., Jones C., Loyall J., 2004.: Adaptive Cyberdefense for Survival and Intrusion Tolerance // Internet Computing. Vol. 8, No.6. – 25-33.
  • 3. Atighetchi M., Pal P.P., Jones C.C., Rubel P., Schantz R.E., Loyall J.P., Zinky J.A., 2003.: Building Auto-Adaptive Distributed Applications: The QuO-APOD Experience // Proceedings of 3rd International Workshop Distributed Auto-adaptive and Reconfigurable Systems (DARES). Providence, Rhode Island, USA. 74-84.
  • 4. Chapman C., Ward S., 2003.: Project Risk Management: processes, techniques and insights. Chichester, John Wiley. Vol. 1210.
  • 5. Chertov R., Fahmy S., Shroff N., 2006.: Emulation versus simulation: A case study of TCP-targeted denial of service attacks. In Proc. of the 2nd International сonference on Testbeds and Research Infrastructures for the Development of Networks and Communities.
  • 6. Chi S., Park J., Jung K., Lee J., 2001.: Network Security Modeling and Cyber At-tack Simulation Methodology//LNCS. Vol. 2119.
  • 7. Goldman R., 2002.: A Stochastic Model for Intrusions//LNCS. Vol. 2516.
  • 8. Gorodetski V., Kotenko I., 2002.: Attacks against Computer Network: Formal Grammar-based Framework and Simulation Tool. RAID 2000//LNCS. Vol. 2516.
  • 9. Harel D. Statecharts: A., 1987.: Visual Formalism for Complex Systems, Science of Computer Programming.
  • 10. Hariri S., Qu G., Dharmagadda T., Ramkishore M., Raghavendra C., 2003.: Impact Analysis of Faults and Attacks in Large-Scale Networks//IEEE Security & Privacy. 456-459.
  • 11. Hatley D., Pirbhai I., 1988.: Strategies for Real- Time System Specification, Dorset House Publishing Co., Inc., NY.
  • 12. Keromytis A., Parekh J., Gross P., Kaiser G., Misra V., Nieh J., Rubensteiny D., Stolfo S., 2003.: A Holistic Approach to Service Survivability // Proceedings of ACM Workshop on Survivable and Self-Regenerative Systems. Fairfax, VA. 11-22.
  • 13. Larson D.R., Field W.E., Farahmand F., Jeffries J.L., 2006.: Foundations in Homeland Security Studies. Purdue University.
  • 14. Larson D.R., Field W.E., F. Farahmand, Aaltonen P.M., 2007.: Managing Resources and Applications for Homeland Security. Purdue University.
  • 15. Lufar V., 2012.: Database of hazardous substances properties. TEKA Commission of Motorization and Power Industry in Agriculture, V. XII, No. 3, 90-93.
  • 16. Marcus K., Mcquade S. 2011.: Internet Addiction and Online Gaming (Cybersafety). Chelsea House Pub.
  • 17. Marcus K., Mcquade S. 2011.: Living With the Internet (Cybersafety). Chelsea House Pub.
  • 18. McNab C., 2004.: Network Security Assessment. O’Reilly Media, Inc.
  • 19. Mirkovic J., Dietrich S., Dittrich D., Reiher P., 2004.: Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall PTR, 400.
  • 20. Moitra S. D., Konda S. L., 2000.: A Simulation Model for Managing Survivability of Net-worked Information Systems, Technical Report CMU/SEI- 2000-TR-020.
  • 21. Negoita M., Neagu D., Palade V., 2005.: Computational Intelligence Engineering of Hybrid Systems. Springer Verlag. 213.
  • 22. Piszcz A., Orlans N., Eyler-Walker Z., Moore D., 2001.: Engineering Issues for an Adaptive Defense Network. MITRE Technical Report.
  • 23. Rohse M., 2003.: Vulnerability naming schemes and description languages: CVE, Bugtraq, AVDL and VulnXML. SANS GSEC PRACTICAL.
  • 24. Smirniy M., Lahno V., Petrov A., 2009.: The research of the conflict request threads in the data protection systems. Proceedings of Lugansk branch of the International Academy of Informatization. № 2(20). V 2. 2009. – 23-30.
  • 25. Shun-Chieh Lin & Shian-Shyong Tseng. 2004.: Constructing detection knowledge for DDoS intrusion tolerance // Expert Systems with Applications. – 2004. – Vol. 27. – 379-390
  • 26. Templeton S., Levitt K., 2000.: A Requires/Provides Model for Computer Attacks. Proc. of the New Security Paradigms Workshop. 274-280.
  • 27. Xiang Y., Zhou W., Chowdhury M., 2004.: A Survey of Active and Passive Defence Mechanisms against DDoS Attacks. Technical Report, TR C04/02, School of Information Technology, Deakin University, Australia. 38-43.
  • 28. Slobodyanuk M., Nechaev G., 2010.: The evaluation technique of logistics system cargo ransportation efficiency development.TEKA Kom. Mot I Energ. Roln. – OL PAN, 10B. Lublin, 162- 170.
  • 29. Urgen M.W. Pan and S. Stolfo., 2002.: Ensemble-based adaptive intrusion detection. In Proceeding of 2002 SIAM International Conference on Data Mining, Arlington, VA.
  • 30. White D., Alijani G., 2003.: Identifying requirements for network security software. SAM ’03. International Conference, 539-543.
  • 31. Zou C.C., Duffield N., Towsley D., Gong W., 2006.: Adaptive Defense against Various Network Attacks // IEEE Journal on Selected Areas in Communications: High-Speed Network Security (J-SAC). Vol.24, №.10. – 44 -51.
Typ dokumentu
Identyfikator YADDA
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.