共 50 条
- [41] An approach for availability evaluation of intrusion-tolerant server architectures 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 252 - 258
- [44] Intrusion-Tolerant Framework for Heterogeneous Wireless Sensor Networks 2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 633 - 636
- [45] Intrusion-tolerant group management in enclaves -: (Transcript of discussion) SECURITY PROTOCOLS, 2002, 2467 : 213 - 216
- [46] Formal specification and verification of the intrusion-Tolerant enclaves protocol Int. J. Netw. Secur., 2007, 3 (288-298):
- [47] Availability analysis and comparison of different intrusion-tolerant systems CONTENT COMPUTING, PROCEEDINGS, 2004, 3309 : 161 - 166
- [48] Dependability and performance evaluation of intrusion-tolerant server architectures DEPENDABLE COMPUTING, 2003, 2847 : 81 - 101
- [49] Toward an Intrusion-Tolerant Power Grid: Challenges and Opportunities 2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2018, : 1321 - 1326
- [50] Secure and Intrusion-tolerant Communication in Wireless Mesh Networks INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 694 - +