共 50 条
- [1] Intrusion-tolerant architectures:: Concepts and design ARCHITECTING DEPENDABLE SYSTEMS, 2003, 2677 : 3 - 36
- [2] Intrusion-tolerant intrusion detection system INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 476 - 483
- [3] A survey on intrusion-tolerant system Yoon, H. (hyoon@nslab.kaist.ac.kr), 1600, Korean Institute of Information Scientists and Engineers (07):
- [4] An approach for availability evaluation of intrusion-tolerant server architectures 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 252 - 258
- [5] Dependability and performance evaluation of intrusion-tolerant server architectures DEPENDABLE COMPUTING, 2003, 2847 : 81 - 101
- [7] An intrusion-tolerant password authentication system 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 110 - 118
- [8] Intrusion-tolerant enclaves 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 216 - 224
- [9] Probabilistic validation of an intrusion-tolerant replication system 2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 615 - 624
- [10] BackupIT: An Intrusion-Tolerant Cooperative Backup System PROCEEDINGS OF THE 8TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, 2009, : 724 - +