Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2024JUST ACCEPTED
Self-Supervised Machine Learning Framework for Online Container Security Attack Detection
ACM Transactions on Autonomous and Adaptive Systems (TAAS), Just Accepted https://doi.org/10.1145/3665795Container security has received much research attention recently. Previous work has proposed to apply various machine learning techniques to detect security attacks in containerized applications. On one hand, supervised machine learning schemes require ...
- research-articleApril 2024
A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS), Volume 19, Issue 2Article No.: 12, pp 1–49https://doi.org/10.1145/3652949Security attacks present unique challenges to the design of self-adaptation mechanism for software-intensive systems due to the adversarial nature of the environment. Game-theoretical approaches have been explored in security to model malicious behaviors ...
- research-articleDecember 2021
AT-DIFC+: Toward Adaptive and Trust-Aware Decentralized Information Flow Control
ACM Transactions on Autonomous and Adaptive Systems (TAAS), Volume 15, Issue 4Article No.: 13, pp 1–35https://doi.org/10.1145/3487292Modern software systems and their corresponding architectures are increasingly decentralized, distributed, and dynamic. As a consequence, decentralized mechanisms are required to ensure security in such architectures. Decentralized Information Flow ...
- research-articleJanuary 2014
A Host-Based Approach for Unknown Fast-Spreading Worm Detection and Containment
ACM Transactions on Autonomous and Adaptive Systems (TAAS), Volume 8, Issue 4Article No.: 21, pp 1–18https://doi.org/10.1145/2555615The fast-spreading worm, which immediately propagates itself after a successful infection, is becoming one of the most serious threats to today’s networked information systems. In this article, we present WormTerminator, a host-based solution for fast ...
- research-articleJanuary 2014
CAAC -- An Adaptive and Proactive Access Control Approach for Emergencies in Smart Infrastructures
ACM Transactions on Autonomous and Adaptive Systems (TAAS), Volume 8, Issue 4Article No.: 20, pp 1–18https://doi.org/10.1145/2555614The article presents an access control model called Criticality Aware Access Control (CAAC) for criticality (emergency) management in smart infrastructures. Criticalities are consequences of events which take a system (in our case, a smart ...
-
- research-articleJuly 2012
First step towards automatic correction of firewall policy faults
ACM Transactions on Autonomous and Adaptive Systems (TAAS), Volume 7, Issue 2Article No.: 27, pp 1–24https://doi.org/10.1145/2240166.2240177Firewalls are critical components of network security and have been widely deployed for protecting private networks. A firewall determines whether to accept or discard a packet that passes through it based on its policy. However, most real-life ...
- research-articleAugust 2008
An adaptive automatically tuning intrusion detection system
ACM Transactions on Autonomous and Adaptive Systems (TAAS), Volume 3, Issue 3Article No.: 10, pp 1–25https://doi.org/10.1145/1380422.1380425An intrusion detection system (IDS) is a security layer to detect ongoing intrusive activities in computer systems and networks. Current IDS have two main problems: The first problem is that typically so many alarms are generated as to overwhelm the ...
- research-articleAugust 2008
Interactive access control for autonomic systems: From theory to implementation
ACM Transactions on Autonomous and Adaptive Systems (TAAS), Volume 3, Issue 3Article No.: 9, pp 1–31https://doi.org/10.1145/1380422.1380424Autonomic communication and computing is a new paradigm for dynamic service integration over a network. An autonomic network crosses organizational and management boundaries and is provided by entities that see each other just as partners. For many ...