{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:55:28Z","timestamp":1750308928689,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","license":[{"start":{"date-parts":[[2003,10,31]],"date-time":"2003-10-31T00:00:00Z","timestamp":1067558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2003,10,31]]},"DOI":"10.1145\/1036921.1036923","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"11-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["A holistic approach to service survivability"],"prefix":"10.1145","author":[{"given":"Angelos D.","family":"Keromytis","sequence":"first","affiliation":[{"name":"Columbia University"}]},{"given":"Janak","family":"Parekh","sequence":"additional","affiliation":[{"name":"Columbia University"}]},{"given":"Philip N.","family":"Gross","sequence":"additional","affiliation":[{"name":"Columbia University"}]},{"given":"Gail","family":"Kaiser","sequence":"additional","affiliation":[{"name":"Columbia University"}]},{"given":"Vishal","family":"Misra","sequence":"additional","affiliation":[{"name":"Columbia University"}]},{"given":"Jason","family":"Nieh","sequence":"additional","affiliation":[{"name":"Columbia University"}]},{"given":"Dan","family":"Rubenstein","sequence":"additional","affiliation":[{"name":"Columbia University"}]},{"given":"Sal","family":"Stolfo","sequence":"additional","affiliation":[{"name":"Columbia University"}]}],"member":"320","published-online":{"date-parts":[[2003,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2001 Economic Impact of Malicious Code Attacks. http : \/\/www. computereconomics com\/cei\/press\/pr9210 i. html.]] 2001 Economic Impact of Malicious Code Attacks. http : \/\/www. computereconomics com\/cei\/press\/pr9210 i. html.]]"},{"key":"e_1_3_2_1_2_1","unstructured":"DARPA OASIS (Organically Assured and Survivable Information System). http:\/\/www.tolerantsystems org\/index html.]] DARPA OASIS (Organically Assured and Survivable Information System). http:\/\/www.tolerantsystems org\/index html.]]"},{"key":"e_1_3_2_1_3_1","unstructured":"Malicious- and Accidental-Fault Tolerance for Intemet Applications. RTD Research Project IST-1999-11583 IST Programme. http:\/\/maftia.org\/.]] Malicious- and Accidental-Fault Tolerance for Intemet Applications. RTD Research Project IST-1999-11583 IST Programme. http:\/\/maftia.org\/.]]"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Microsoft Security Tool Kit: Installing and Securing a New Windows 2000 System. Microsoft TechNet. http:\/\/www.microsoft.com\/technet\/security\/tools\/tools\/w2knew asp.]] Microsoft Security Tool Kit: Installing and Securing a New Windows 2000 System. Microsoft TechNet. http:\/\/www.microsoft.com\/technet\/security\/tools\/tools\/w2knew asp.]]","DOI":"10.1016\/S1353-4858(00)90027-8"},{"key":"e_1_3_2_1_5_1","unstructured":"Microsoft Windows Software Update Services. http:\/\/www.microsoft.com\/windows2000\/windowsupdate\/sus\/.]] Microsoft Windows Software Update Services. http:\/\/www.microsoft.com\/windows2000\/windowsupdate\/sus\/.]]"},{"key":"e_1_3_2_1_6_1","unstructured":"OC48 Analysis - Trace Data Stratified by Applications. http:\/\/www.caida org\/analysis\/workload\/byappli\\-cation\/oc48\/pott\\_analy%sis\\_app.xml.]] OC48 Analysis - Trace Data Stratified by Applications. http:\/\/www.caida org\/analysis\/workload\/byappli\\-cation\/oc48\/pott\\_analy%sis\\_app.xml.]]"},{"key":"e_1_3_2_1_7_1","unstructured":"RedHat 9 Security Advisories. https:\/\/rhn.redhat.com\/errata\/rh9-errata-security html.]] RedHat 9 Security Advisories. https:\/\/rhn.redhat.com\/errata\/rh9-errata-security html.]]"},{"key":"e_1_3_2_1_8_1","unstructured":"The Code Security Analysis Kit (CoSAK). http:\/\/serg.cs.drexel edu\/cosak\/index shtml\/.]] The Code Security Analysis Kit (CoSAK). http:\/\/serg.cs.drexel edu\/cosak\/index shtml\/.]]"},{"volume-title":"Cisco Systems","author":"Network-Based Application Using","key":"e_1_3_2_1_9_1","unstructured":"Using Network-Based Application Recognition and Access Control Lists for Blocking the \" Code Red\" Worm at Network Ingress Points . Technical report , Cisco Systems , Inc .]] Using Network-Based Application Recognition and Access Control Lists for Blocking the \"Code Red\" Worm at Network Ingress Points. Technical report, Cisco Systems, Inc.]]"},{"key":"e_1_3_2_1_10_1","unstructured":"Web Server Survey. http:\/\/www.securityspace.com\/s_survey\/data\/200304\/.]] Web Server Survey. http:\/\/www.securityspace.com\/s_survey\/data\/200304\/.]]"},{"key":"e_1_3_2_1_11_1","unstructured":"Intrusion Tolerant Server Infrastructure. http:\/\/www.tolerantsystems org\/ProjectSummaries \/Intrusion_Tol erant_Serv%er_Infrastructure.html 2000.]] Intrusion Tolerant Server Infrastructure. http:\/\/www.tolerantsystems org\/ProjectSummaries \/Intrusion_Tol erant_Serv%er_Infrastructure.html 2000.]]"},{"key":"e_1_3_2_1_12_1","unstructured":"CERT Advisory CA-2001-19: 'Code Red' Worm Exploiting Buffer Overflow in IIS Indexing Service DLL. http:\/\/www.cert.org\/advisories\/CA-200i-19.html July 2001.]] CERT Advisory CA-2001-19: 'Code Red' Worm Exploiting Buffer Overflow in IIS Indexing Service DLL. http:\/\/www.cert.org\/advisories\/CA-200i-19.html July 2001.]]"},{"key":"e_1_3_2_1_13_1","unstructured":"Cert Advisory CA-2003-04: MS-SQL Server Worm. http:\/\/www.cert.org\/advisories\/CA-2003-04.html January 2003.]] Cert Advisory CA-2003-04: MS-SQL Server Worm. http:\/\/www.cert.org\/advisories\/CA-2003-04.html January 2003.]]"},{"key":"e_1_3_2_1_14_1","volume-title":"February","author":"Slammer Worm The Spread","year":"2003","unstructured":"The Spread of the Sapphire\/ Slammer Worm . http:\/\/www.silicondefense,com\/research\/worms\/slammer, php , February 2003 .]] The Spread of the Sapphire\/Slammer Worm. http:\/\/www.silicondefense,com\/research\/worms\/slammer, php, February 2003.]]"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586118"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754701.1754705"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/839280.840575"},{"key":"e_1_3_2_1_18_1","volume-title":"19th IEEElnternational Conference on Distributed Computing Systems Workshop","author":"Balzer R.","year":"1994","unstructured":"R. Balzer . Mediating connectors . In 19th IEEElnternational Conference on Distributed Computing Systems Workshop , 1994 .]] R. Balzer. Mediating connectors. In 19th IEEElnternational Conference on Distributed Computing Systems Workshop, 1994.]]"},{"key":"e_1_3_2_1_19_1","volume-title":"Outliers in Statistical Data","author":"Barnett V.","year":"1994","unstructured":"V. Barnett and T. Lewis . Outliers in Statistical Data . John Wiley and Sons , 1994 .]] V. Barnett and T. Lewis. Outliers in Statistical Data. John Wiley and Sons, 1994.]]"},{"key":"e_1_3_2_1_20_1","first-page":"37","volume-title":"magazine, special issue on security","author":"Bellovin S. M.","year":"1999","unstructured":"S. M. Bellovin . Distributed Firewalls . ;login : magazine, special issue on security , pages 37 - 39 , November 1999 .]] S. M. Bellovin. Distributed Firewalls. ;login: magazine, special issue on security, pages 37-39, November 1999.]]"},{"key":"e_1_3_2_1_21_1","volume-title":"The Shockwave Rider","author":"Brunner J.","year":"1975","unstructured":"J. Brunner . The Shockwave Rider . Del Rey Books , Canada , 1975 .]] J. Brunner. The Shockwave Rider. Del Rey Books, Canada, 1975.]]"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/380749.380767"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586142"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2003.1266234"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 7th USENIX Security Symposium","author":"Cowan C.","year":"1998","unstructured":"C. Cowan , C. Pu , D. Maier , H. Hinton , J. Walpole , P. Bakke , S. Beattie , A. Grier , P. Wagle , and Q. Zhang . Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks . In Proceedings of the 7th USENIX Security Symposium , January 1998 .]] C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Symposium, January 1998.]]"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"e_1_3_2_1_27_1","volume-title":"The TLS protocol version 1.0. RFC","author":"Dierks T.","year":"1999","unstructured":"T. Dierks and C. Allen . The TLS protocol version 1.0. RFC 2246, January 1999 .]] T. Dierks and C. Allen. The TLS protocol version 1.0. RFC 2246, January 1999.]]"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/645529.658128"},{"key":"e_1_3_2_1_29_1","first-page":"120","volume-title":"A sense of self for unix processes","author":"Forrest S.","year":"1996","unstructured":"S. Forrest , S. A. Hofmeyr , A. Somayaji , and T. A. Longstaff . A sense of self for unix processes , pages 120 - 128 . IEEE Computer Society , 1996 .]] S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for unix processes, pages 120-128. IEEE Computer Society, 1996.]]"},{"key":"e_1_3_2_1_30_1","first-page":"7","article-title":"The art of port scanning","volume":"51","author":"Fyodor","year":"1997","unstructured":"Fyodor . The art of port scanning . Phrack 51 , 7 , September 1997 . http:\/\/www.phrack,com\/phrack\/5 i\/P51-ii.]] Fyodor. The art of port scanning. Phrack 51, 7, September 1997. http:\/\/www.phrack,com\/phrack\/5 i\/P51-ii.]]","journal-title":"Phrack"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/306549.306563"},{"key":"e_1_3_2_1_32_1","volume-title":"Host-based anomaly detection by wrapping file system accesses. Technical report","author":"Hershkop S.","year":"2003","unstructured":"S. Hershkop , R. Ferster , L. H. Bui , K. Wang , and S. J. Stolfo . Host-based anomaly detection by wrapping file system accesses. Technical report , Columbia University Department of Computer Science , April 2003 .]] S. Hershkop, R. Ferster, L. H. Bui, K. Wang, and S. J. Stolfo. Host-based anomaly detection by wrapping file system accesses. Technical report, Columbia University Department of Computer Science, April 2003.]]"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298081.1298084"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.353052"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Workshop on Enterprise Security","author":"Janakiraman R.","year":"2003","unstructured":"R. Janakiraman , M. Waldvogel , and Q. Zhang . Indra: A peer-topeer approach to network intrusion detection and prevention . In Proceedings of the IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Workshop on Enterprise Security , June 2003 .]] R. Janakiraman, M. Waldvogel, and Q. Zhang. Indra: A peer-topeer approach to network intrusion detection and prevention. In Proceedings of the IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Workshop on Enterprise Security, June 2003.]]"},{"key":"e_1_3_2_1_36_1","volume-title":"SRI International","author":"Javitz H. S.","year":"1993","unstructured":"H. S. Javitz and A. Valdes . The nides statistical component: Description and justification. Technical report , SRI International , 1993 .]] H. S. Javitz and A. Valdes. The nides statistical component: Description and justification. Technical report, SRI International, 1993.]]"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754701.1754714"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACW.2003.1210200"},{"key":"e_1_3_2_1_39_1","volume-title":"Security Architecture for the Internet Protocol. RFC","author":"Kent S.","year":"1998","unstructured":"S. Kent and R. Atkinson . Security Architecture for the Internet Protocol. RFC 2401, Nov. 1998 .]] S. Kent and R. Atkinson. Security Architecture for the Internet Protocol. RFC 2401, Nov. 1998.]]"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633032"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818807"},{"key":"e_1_3_2_1_42_1","first-page":"134","volume-title":"Automated detection of vulnerabilifies in privileged programs by execution monitoring. In lOth Annual Computer Security Applications Conference","author":"Ko C.","year":"1994","unstructured":"C. Ko , G. Fink , and K. Levitt . Automated detection of vulnerabilifies in privileged programs by execution monitoring. In lOth Annual Computer Security Applications Conference , pages 134 - 144 , December 1994 .]] C. Ko, G. Fink, and K. Levitt. Automated detection of vulnerabilifies in privileged programs by execution monitoring. In lOth Annual Computer Security Applications Conference, pages 134-144, December 1994.]]"},{"issue":"3","key":"e_1_3_2_1_43_1","article-title":"Feedback control applied to survivability: a host-based autonomic defense system","volume":"52","author":"Kreidl O.","year":"2003","unstructured":"O. Kreidl and T. Frazier . Feedback control applied to survivability: a host-based autonomic defense system . IEEE Transactions on Reliability , Vol. 52 , No. 3 , September 2003 .]] O. Kreidl and T. Frazier. Feedback control applied to survivability: a host-based autonomic defense system. IEEE Transactions on Reliability, Vol. 52, No. 3, September 2003.]]","journal-title":"IEEE Transactions on Reliability"},{"key":"e_1_3_2_1_44_1","first-page":"177","volume-title":"Proceedings of the lOth USENIX Security Symposium","author":"Larochelle D.","year":"2001","unstructured":"D. Larochelle and D. Evans . Statically Detecting Likely Buffer Overflow Vulnerabilities . In Proceedings of the lOth USENIX Security Symposium , pages 177 - 190 , August 2001 .]] D. Larochelle and D. Evans. Statically Detecting Likely Buffer Overflow Vulnerabilities. In Proceedings of the lOth USENIX Security Symposium, pages 177-190, August 2001.]]"},{"key":"e_1_3_2_1_45_1","volume-title":"A data mining framework for building intrusion detection models","author":"Lee W.","year":"1999","unstructured":"W. Lee , S. Stolfo , and K. Mok . A data mining framework for building intrusion detection models . 1999 .]] W. Lee, S. Stolfo, and K. Mok. A data mining framework for building intrusion detection models. 1999.]]"},{"key":"e_1_3_2_1_46_1","first-page":"50","volume-title":"Learning patterns from unix processes execution traces for intrusion detection","author":"Lee W.","year":"1997","unstructured":"W. Lee , S. J. Stolfo , and P. K. Chan . Learning patterns from unix processes execution traces for intrusion detection , pages 50 - 56 . AAAI Press , 1997 .]] W. Lee, S. J. Stolfo, and P. K. Chan. Learning patterns from unix processes execution traces for intrusion detection, pages 50-56. AAAI Press, 1997.]]"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312212"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775102"},{"key":"e_1_3_2_1_50_1","volume-title":"Mobility: Pro-cesses, Computers, and Agents","author":"Milojicic D.","year":"1999","unstructured":"D. Milojicic , E Douglis , and R. Wheeler . Mobility: Pro-cesses, Computers, and Agents . Addison Wesley Longman , February 1999 .]] D. Milojicic, E Douglis, and R. Wheeler. Mobility: Pro-cesses, Computers, and Agents. Addison Wesley Longman, February 1999.]]"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209212"},{"key":"e_1_3_2_1_52_1","first-page":"9","volume-title":"Proceedings of the lOth Usenix Security Symposium","author":"Moore D.","year":"2001","unstructured":"D. Moore , G. M. Voelker , and S. Savage . Inferring intemet Denial-of-Service activity . In Proceedings of the lOth Usenix Security Symposium , pages 9 - 22 , 2001 .]] D. Moore, G. M. Voelker, and S. Savage. Inferring intemet Denial-of-Service activity. In Proceedings of the lOth Usenix Security Symposium, pages 9-22, 2001.]]"},{"key":"e_1_3_2_1_53_1","volume-title":"Network WorM","author":"Newman D.","year":"2002","unstructured":"D. Newman , J. Snyder , and R. Thayer . Crying wolf: False alarms hide attacks . Network WorM , June 2002 . http:\/\/www.nwfusion,tom\/techinsider\/2002\/0624securityl.html.]] D. Newman, J. Snyder, and R. Thayer. Crying wolf: False alarms hide attacks. Network WorM, June 2002. http:\/\/www.nwfusion,tom\/techinsider\/2002\/0624securityl.html.]]"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194893"},{"key":"e_1_3_2_1_55_1","first-page":"122","volume-title":"An Analyst's Handbook","author":"Northcutt S.","year":"1999","unstructured":"S. Northcutt . Network Intrusion Detection : An Analyst's Handbook , pages 122 - 139 . New Riders , Indianapolis , 1999 .]] S. Northcutt. Network Intrusion Detection: An Analyst's Handbook, pages 122-139. New Riders, Indianapolis, 1999.]]"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060323"},{"key":"e_1_3_2_1_57_1","volume-title":"Proceedings of the 6th IEEE International Symposium on Object-oriented Real-time Distributed Computing","author":"Al P.","year":"2003","unstructured":"P. P Al , M. Afighetchi , F. Webber , R. Schantz , and C. Jones . Adaptive Use of Netwokr-Centric Mechanisms in Cyber-Defense . In Proceedings of the 6th IEEE International Symposium on Object-oriented Real-time Distributed Computing , May 2003 .]] P. PAl, M. Afighetchi, F. Webber, R. Schantz, and C. Jones. Adaptive Use of Netwokr-Centric Mechanisms in Cyber-Defense. In Proceedings of the 6th IEEE International Symposium on Object-oriented Real-time Distributed Computing, May 2003.]]"},{"key":"e_1_3_2_1_58_1","volume-title":"Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications","author":"Pal P.","year":"2003","unstructured":"P. Pal , M. Atighetchi , F. Webber , R. Schantz , and C. Jones . Reflections on Evaluating Survivability: The APOD Experiments . In Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications , April 2003 .]] P. Pal, M. Atighetchi, F. Webber, R. Schantz, and C. Jones. Reflections on Evaluating Survivability: The APOD Experiments. In Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications, April 2003.]]"},{"key":"e_1_3_2_1_59_1","volume-title":"Technical report","author":"Perrochon L.","year":"1999","unstructured":"L. Perrochon . Using context-based correlation in network operations management. Technical report , Stanford University Department of Computer Science , 1999 . http:\/\/pavg.stanford,edu\/cep\/cidf,ps.gz.]] L. Perrochon. Using context-based correlation in network operations management. Technical report, Stanford University Department of Computer Science, 1999. http:\/\/pavg.stanford,edu\/cep\/cidf,ps.gz.]]"},{"key":"e_1_3_2_1_60_1","volume-title":"Proceedings of the USENIX Annual Technical Conference","author":"Prasad M.","year":"2003","unstructured":"M. Prasad and T. Chiueh . A Binary Rewriting Defense Against Stack-based Buffer Overflow Attacks . In Proceedings of the USENIX Annual Technical Conference , June 2003 .]] M. Prasad and T. Chiueh. A Binary Rewriting Defense Against Stack-based Buffer Overflow Attacks. In Proceedings of the USENIX Annual Technical Conference, June 2003.]]"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.5555\/820756.821786"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/647883.738397"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194879"},{"key":"e_1_3_2_1_64_1","volume-title":"Proceedings of AUUG2K","author":"Segall B.","year":"2000","unstructured":"B. Segall , D. Arnold , J. Boot , Content-based routing with Elvin4 . In Proceedings of AUUG2K , June 2000 .]] B. Segall, D. Arnold, J. Boot, et al. Content-based routing with Elvin4. In Proceedings of AUUG2K, June 2000.]]"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/358453.358455"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/938984.939795"},{"key":"e_1_3_2_1_67_1","volume-title":"Proceedings of the Seventh ACM Conference on Computer and Communications Security","author":"Staniford S.","year":"2000","unstructured":"S. Staniford , J. Hoagland , and J. McAlemey . Practical automated detection of stealthy portscans . In Proceedings of the Seventh ACM Conference on Computer and Communications Security , Athens, Greece , 2000 .]] S. Staniford, J. Hoagland, and J. McAlemey. Practical automated detection of stealthy portscans. In Proceedings of the Seventh ACM Conference on Computer and Communications Security, Athens, Greece, 2000.]]"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720288"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECBS.2003.1194805"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"crossref","DOI":"10.21236\/ADA461216","volume-title":"Intrusion detection, diagnosis, and recovery with self-secunng storage. Technical report","author":"Strunk J. D.","year":"2002","unstructured":"J. D. Strunk , G. R. Goodson , A. G. Pennington , C. A. Soules , and G. R. Ganger . Intrusion detection, diagnosis, and recovery with self-secunng storage. Technical report , Carnegie Mellon University , 2002 .]] J. D. Strunk, G. R. Goodson, A. G. Pennington, C. A. Soules, and G. R. Ganger. Intrusion detection, diagnosis, and recovery with self-secunng storage. Technical report, Carnegie Mellon University, 2002.]]"},{"key":"e_1_3_2_1_71_1","volume-title":"W3C Workshop on Web Services","author":"Thompson P.","year":"2001","unstructured":"P. Thompson . Web services - beyond http tunneling . In W3C Workshop on Web Services , April 2001 .]] P. Thompson. Web services - beyond http tunneling. In W3C Workshop on Web Services, April 2001.]]"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.5555\/776816.776848"},{"key":"e_1_3_2_1_73_1","volume-title":"Proceedings of the IEEE 2nd SMC Information Assurance Workshop","author":"Wang F.","year":"2001","unstructured":"F. Wang , F. Gong , C. Sargor , K. Goseva-Popstojanova , K. Trivedi , and F. Jou . Sitar: A scalable intrusion tolerance architecture for distributed servers . In Proceedings of the IEEE 2nd SMC Information Assurance Workshop , 2001 .]] F. Wang, F. Gong, C. Sargor, K. Goseva-Popstojanova, K. Trivedi, and F. Jou. Sitar: A scalable intrusion tolerance architecture for distributed servers. In Proceedings of the IEEE 2nd SMC Information Assurance Workshop, 2001.]]"},{"key":"e_1_3_2_1_74_1","first-page":"153","volume-title":"Wang and R. Uppalli. SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services. In Volume H of the Proceedings of DISCEX III","author":"E","year":"2003","unstructured":"E Wang and R. Uppalli. SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services. In Volume H of the Proceedings of DISCEX III , pages 153 - 155 , April 2003 .]] E Wang and R. Uppalli. SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services. In Volume H of the Proceedings of DISCEX III, pages 153-155, April 2003.]]"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"e_1_3_2_1_76_1","first-page":"187","volume-title":"Proceedings of the Third Information Survivability Workshop (ISW2000)","author":"Wolf A.","year":"2000","unstructured":"A. Wolf , D. Heimbigner , A. Carzaniga , J. Knight , E Devenbu , and M. Gertz . Bend, don't break: Using reconfiguration to achieve survivability . In Proceedings of the Third Information Survivability Workshop (ISW2000) , pages 187 - 190 , October 2000 .]] A. Wolf, D. Heimbigner, A.Carzaniga, J. Knight, E Devenbu, and M. Gertz. Bend, don't break: Using reconfiguration to achieve survivability. In Proceedings of the Third Information Survivability Workshop (ISW2000), pages 187-190, October 2000.]]"},{"key":"e_1_3_2_1_77_1","first-page":"187","volume-title":"Proceedings of the 3rd Information Survivability Workshop","author":"Wolf A.","year":"2000","unstructured":"A. Wolf , D. Heimbigner , A. Carzaniga , J. Knight , E Devenbu , and M. Gertz . Bend, Don't Break: Using Reconfiguration to Achieve Survivability . In Proceedings of the 3rd Information Survivability Workshop , pages 187 - 190 , October 2000 .]] A. Wolf, D. Heimbigner, A. Carzaniga, J. Knight, E Devenbu, and M. Gertz. Bend, Don't Break: Using Reconfiguration to Achieve Survivability. In Proceedings of the 3rd Information Survivability Workshop, pages 187-190, October 2000.]]"},{"key":"e_1_3_2_1_78_1","volume-title":"LinuxExpo","author":"Zadok E.","year":"1999","unstructured":"E. Zadok and I. Badulescu . A stackable file system interface for Linux . In LinuxExpo 99, May 1999 .]] E. Zadok and I. Badulescu. A stackable file system interface for Linux. In LinuxExpo 99, May 1999.]]"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586130"}],"event":{"name":"CCS03: Tenth ACM Conference on Computer and Communications Security 2003","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Fairfax VA","acronym":"CCS03"},"container-title":["Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1036921.1036923","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1036921.1036923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:36:48Z","timestamp":1750282608000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1036921.1036923"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,10,31]]},"references-count":78,"alternative-id":["10.1145\/1036921.1036923","10.1145\/1036921"],"URL":"https:\/\/doi.org\/10.1145\/1036921.1036923","relation":{},"subject":[],"published":{"date-parts":[[2003,10,31]]},"assertion":[{"value":"2003-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}