共 50 条
- [12] Adaptive Intrusion-Tolerant Approach to Defeat Attacks of Cryptographic Protocol ISTM/2009: 8TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, 2009, : 3444 - 3447
- [13] A survey on intrusion-tolerant system Yoon, H. (hyoon@nslab.kaist.ac.kr), 1600, Korean Institute of Information Scientists and Engineers (07):
- [14] Intrusion-Tolerant Autonomous Driving 2018 IEEE 21ST INTERNATIONAL SYMPOSIUM ON REAL-TIME DISTRIBUTED COMPUTING (ISORC 2018), 2018, : 130 - 133
- [15] Practical Intrusion-Tolerant Networks PROCEEDINGS 2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2016, 2016, : 45 - 56
- [16] A novel, adaptive replica control protocol for distributed intrusion-tolerant environments 2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 163 - +
- [17] An intrusion-tolerant mechanism for intrusion detection systems ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 319 - +
- [18] Intrusion-tolerant architectures:: Concepts and design ARCHITECTING DEPENDABLE SYSTEMS, 2003, 2677 : 3 - 36
- [19] Formal Specification and Verification of Transmission Control Protocol ICCWCS'17: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING AND WIRELESS COMMUNICATION SYSTEMS, 2017,
- [20] Error-Tolerant Processors: Formal Specification and Verification 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2015, : 286 - 293