共 50 条
- [11] Availability analysis and comparison of different intrusion-tolerant systems CONTENT COMPUTING, PROCEEDINGS, 2004, 3309 : 161 - 166
- [12] A Network Intrusion-Tolerant System Based on Adaptive Algorithm 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2890 - 2893
- [14] Intrusion-Tolerant Autonomous Driving 2018 IEEE 21ST INTERNATIONAL SYMPOSIUM ON REAL-TIME DISTRIBUTED COMPUTING (ISORC 2018), 2018, : 130 - 133
- [15] Intrusion-tolerant based survivable model of database system CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (03): : 481 - 484
- [16] Experiences with building an intrusion-tolerant group communication system SOFTWARE-PRACTICE & EXPERIENCE, 2008, 38 (06): : 639 - 666
- [17] Proactive Recovery in Intrusion-Tolerant System Based on TTCB 2012 INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING AND COMMUNICATION TECHNOLOGY (ICCECT 2012), 2012, : 799 - 802
- [18] Practical Intrusion-Tolerant Networks PROCEEDINGS 2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2016, 2016, : 45 - 56
- [19] Distributed group membership algorithm in intrusion-tolerant system ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 511 - 515
- [20] Intrusion-tolerant system design for web server survivability INFORMATION SECURITY APPLICATIONS, 2003, 2908 : 124 - 134