共 50 条
- [21] An intrusion-tolerant mechanism for intrusion detection systems ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 319 - +
- [22] An architecture for an adaptive intrusion-tolerant server SECURITY PROTOCOLS, 2004, 2845 : 158 - 177
- [23] Design of a Lightweight Intrusion-Tolerant System for Highly Available Servers KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS, 2017, 112 : 2319 - 2327
- [24] Secure intrusion-tolerant replication on the Internet INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 167 - 176
- [25] Intrusion-tolerant group management in enclaves INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, : 203 - 212
- [26] A Scalable and Intrusion-tolerant Digital Time-stamping System 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2357 - 2363
- [27] Randomized intrusion-tolerant asynchronous services DSN 2006 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2006, : 568 - 577
- [28] An architecture for adaptive intrusion-tolerant applications SOFTWARE-PRACTICE & EXPERIENCE, 2006, 36 (11-12): : 1331 - 1354
- [29] Building intrusion-tolerant secure software CGO 2005: INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, 2005, : 255 - 266
- [30] Model-based validation of an intrusion-tolerant information system 23RD IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2004, : 184 - 194