| S. George, D. Evans, S. Marchette |
M.G. Merideth, “Proactive containment of malice in survivable distributed system” P. Narasimhan, “Proactive containment of malice in survivable distributed system, International Conference on Security and Management” | |
B. Schmerl, | |
J. Aldrich, “Architecturecentric programming for adaptive systems, Proceedings of the First Workshop on Self-Healing Systems” V. Sazawal, C. Chambers, D. Nokin, | |
Healing on different system | R. Sharman, H.R. Rao, S. Upadhyaya, P. Khot, S. Manocha, S. Ganguly, |
Prediction | M.W. Knop, “Windows performance monitoring and data reduction using watchtower, Workshop on Self-Healing, Adaptive and self-MAN aged Systems” J.M. Schopf, P.A. Dinda |
Fuad, et al., “Self-Healing by Means of Runtime Execution Profiling” | |
Philip Koopman “Elements of the Self-Healing System Problem Space” | |
C. Dabrowski, K.L. Mills “Understanding self-healing in service discovery systems, Proceedings of the First Workshop on Self-Healing Systems” | |
Self evaluate | G. Kaiser, “An approach to autonomizing legacy systems, Workshop on Self-Healing, Adaptive and self-MAN aged Systems” P. Gross, G. Kc, J. Parekh. |
Self healing detection | Brumley et al. “Sting: An End-to-End Self-Healing System for Defending against Internet Worms” |