共 50 条
- [31] Formal verification of an intrusion-tolerant group membership protocol IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2003, E86D (12): : 2612 - 2622
- [32] An approach for availability evaluation of intrusion-tolerant server architectures 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 252 - 258
- [33] Intrusion-Tolerant Framework for Heterogeneous Wireless Sensor Networks 2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 633 - 636
- [34] Intrusion-tolerant group management in enclaves -: (Transcript of discussion) SECURITY PROTOCOLS, 2002, 2467 : 213 - 216
- [35] A Network Intrusion-Tolerant System Based on Adaptive Algorithm 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2890 - 2893
- [36] Formal specification and verification of the intrusion-Tolerant enclaves protocol Int. J. Netw. Secur., 2007, 3 (288-298):
- [38] Intrusion-tolerant based survivable model of database system CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (03): : 481 - 484
- [39] Experiences with building an intrusion-tolerant group communication system SOFTWARE-PRACTICE & EXPERIENCE, 2008, 38 (06): : 639 - 666
- [40] Availability analysis and comparison of different intrusion-tolerant systems CONTENT COMPUTING, PROCEEDINGS, 2004, 3309 : 161 - 166