共 50 条
- [21] Intrusion-Tolerant Location Information Services in Intelligent Vehicular Networks INTELLIGENT COMPUTING AND INFORMATION SCIENCE, PT II, 2011, 135 : 699 - +
- [22] Intrusion-tolerant architectures:: Concepts and design ARCHITECTING DEPENDABLE SYSTEMS, 2003, 2677 : 3 - 36
- [23] Intrusion Detection in Gaussian Distributed Heterogeneous Wireless Sensor Networks GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 5294 - 5299
- [24] An architecture for an adaptive intrusion-tolerant server SECURITY PROTOCOLS, 2004, 2845 : 158 - 177
- [25] Secure intrusion-tolerant replication on the Internet INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 167 - 176
- [26] Intrusion-tolerant group management in enclaves INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, : 203 - 212
- [27] Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks COMPUTER SAFETY, RELIABILITY, AND SECURITY (SAFECOMP 2014), 2014, 8666 : 214 - 229
- [28] Randomized intrusion-tolerant asynchronous services DSN 2006 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2006, : 568 - 577
- [29] An architecture for adaptive intrusion-tolerant applications SOFTWARE-PRACTICE & EXPERIENCE, 2006, 36 (11-12): : 1331 - 1354
- [30] Building intrusion-tolerant secure software CGO 2005: INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, 2005, : 255 - 266