共 50 条
- [2] Security Evaluation of an Intrusion Tolerant System with MRSPNs 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 427 - 432
- [3] Security attributes analysis for intrusion tolerant systems Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1505 - 1512
- [5] Intrusion tolerant systems 2000 PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2000, : 3 - 3
- [6] Security analysis model of intrusion tolerant systems based on game theory Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2013, 35 (08): : 1933 - 1939
- [7] Intrusion tolerant IT security for NAS architecture FALL 2000 45TH ANNUAL AIR TRAFFIC CONTROL ASSOCIATION CONFERENCE PROCEEDINGS, 2000, : 110 - 115
- [8] Layered Security Framework for Intrusion Prevention INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (06): : 253 - 259
- [9] Cyber Security Analysis and Evaluation for Intrusion Detection Systems CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 1765 - 1783
- [10] Mean Time to Security Failure of VM-Based Intrusion Tolerant Systems 2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2016), 2016, : 128 - 133