Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT), 2009 Second International Conference on Dependability, pp.60-65, 2009. ,
DOI : 10.1109/DEPEND.2009.15
Storage: High-availability file server with heartbeat, System Administration, pp.24-32, 2001. ,
Automated application-level checkpointing of MPI programs, ACM SIGPLAN Notices, vol.38, issue.10, pp.84-94, 2003. ,
DOI : 10.1145/966049.781513
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.365.8549
Stuxnet worm causes industry concern for security firmsStuxnet-worm-causes-industry-concern-for-security- firms.html), 2010. ,
Denial-of-service attack-detection techniques, IEEE Internet Computing, vol.10, issue.1, pp.82-89, 2006. ,
DOI : 10.1109/MIC.2006.5
CLIP, Proceedings of the 1997 ACM/IEEE conference on Supercomputing (CDROM) , Supercomputing '97, p.33, 1997. ,
DOI : 10.1145/509593.509626
Live migration of virtual machines, Proceedings of the Second Conference on Symposium on Networked Systems Design and Implementation, pp.273-286, 2005. ,
Virtualization with KVM, Linux Journal (www.linuxjournal.com, issue.9764, 2008. ,
Closing cluster attack windows through server redundancy and rotations, Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid, p.21, 2006. ,
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security, Journal of Networks, vol.1, issue.5, pp.21-30, 2006. ,
DOI : 10.4304/jnw.1.5.21-30
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.8497
Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services, 2009 Eighth IEEE International Symposium on Network Computing and Applications, pp.114-117, 2009. ,
DOI : 10.1109/NCA.2009.37
A security evaluation of a novel resilient web serving architecture: Lessons learned through industry/academia collaboration, 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.188-193, 2010. ,
DOI : 10.1109/DSNW.2010.5542597
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs, 2009 Annual Computer Security Applications Conference, pp.117-126, 2009. ,
DOI : 10.1109/ACSAC.2009.21
URL : http://cis.ksu.edu/~zhangs84/ReadingList/MIT09ACSAC.pdf
Virtualization in Linux, OpenVZ (ftp.openvz.org/doc/open vz-intro.pdf), 2006. ,
Cetus ??? An Extensible Compiler Infrastructure for Source-to-Source Transformation, Proceedings of the Sixteenth International Workshop on Languages and Compilers for Parallel Computing, pp.539-553, 2003. ,
DOI : 10.1007/978-3-540-24644-2_35
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.5378
lxc man pages (lxc.sourceforge.net/index ,
Cybersecurity Progress after President Obama's Address, The White House, 2010. ,
A high-availability clustering architecture with data integrity guarantees, Proceedings 42nd IEEE Symposium on Foundations of Computer Science, pp.178-182, 2001. ,
DOI : 10.1109/CLUSTR.2001.959974
CPPC: A compiler-assisted tool for portable checkpointing of message-passing applications , Concurrency and Computation: Practice and Experience, pp.749-766, 2010. ,
Securing FreeBSD using Jail, System Administration, pp.31-37, 2001. ,
Cross-Platform GUI Programming with wxWidgets, 2005. ,
Intrusion tolerance to mitigate attacks that persist, presented at the Secure and Resilient Cyber Architectures Conference, 2010. ,
CoCheck: checkpointing and process migration for MPI, Proceedings of International Conference on Parallel Processing, pp.526-531, 1996. ,
DOI : 10.1109/IPPS.1996.508106
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.5240