共 35 条
- [1] A Pull-Type Security Patch Management of an Intrusion Tolerant System under a Periodic Vulnerability Checking Strategy 2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2018, : 630 - 635
- [2] Mean Time to Security Failure of VM-Based Intrusion Tolerant Systems 1600, Institute of Electrical and Electronics Engineers Inc., United States
- [3] Mean Time to Security Failure of VM-Based Intrusion Tolerant Systems 2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2016), 2016, : 128 - 133
- [4] Performance Evaluation of VM-Based Intrusion Tolerant Systems with Poisson Arrivals 2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2016, : 181 - 187
- [5] Survivability Analysis of VM-Based Intrusion Tolerant Systems IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2015, E98D (12): : 2082 - 2090
- [6] A Network Intrusion-Tolerant System Based on Adaptive Algorithm 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2890 - 2893
- [7] Intrusion-tolerant based survivable model of database system CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (03): : 481 - 484
- [8] Proactive Recovery in Intrusion-Tolerant System Based on TTCB 2012 INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING AND COMMUNICATION TECHNOLOGY (ICCECT 2012), 2012, : 799 - 802
- [9] Model-based validation of an intrusion-tolerant information system 23RD IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2004, : 184 - 194
- [10] Security Evaluation of an Intrusion Tolerant System with MRSPNs 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 427 - 432