2013
DOI: 10.1007/s11227-013-1019-3
|View full text |Cite
|
Sign up to set email alerts
|

SHAPE—an approach for self-healing and self-protection in complex distributed networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 18 publications
(17 citation statements)
references
References 14 publications
0
16
0
Order By: Relevance
“…Further, lexical analyzer-based freeware tools such as MCat (windows) and MCELogs (Linux) 33 Further, lexical analyzer-based freeware tools such as MCat (windows) and MCELogs (Linux) 33 …”
Section: Self-configuringmentioning
confidence: 99%
See 3 more Smart Citations
“…Further, lexical analyzer-based freeware tools such as MCat (windows) and MCELogs (Linux) 33 Further, lexical analyzer-based freeware tools such as MCat (windows) and MCELogs (Linux) 33 …”
Section: Self-configuringmentioning
confidence: 99%
“…Network fault can occur due to network breakage, physical damage, packet loss, and lack of scalability in distributed networks. 33 Whenever the node is added to the network, Hardware Hardening Agent (HHA) checks for its device drivers and performs the process of hardening. Software fault can occur due to unavailability of a required number of resources, storage space, resource contention (deadlock), and unhandled exception in high resource intensive workloads.…”
Section: Self-healingmentioning
confidence: 99%
See 2 more Smart Citations
“…This is achieved though scanning untrusted activities and then reacting accordingly to these activities. This protection process is achieved without the user's awareness of it [11]. As discussed in [8], to build a self-protected, the following principles are required:…”
Section: Self-protectionmentioning
confidence: 99%