共 50 条
- [1] Intrusion-tolerant enclaves [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 216 - 224
- [2] Intrusion-tolerant intrusion detection system [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 476 - 483
- [3] Practical Intrusion-Tolerant Networks [J]. PROCEEDINGS 2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2016, 2016, : 45 - 56
- [4] An intrusion-tolerant mechanism for intrusion detection systems [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 319 - +
- [5] An architecture for an adaptive intrusion-tolerant server [J]. SECURITY PROTOCOLS, 2004, 2845 : 158 - 177
- [6] Intrusion-tolerant architectures:: Concepts and design [J]. ARCHITECTING DEPENDABLE SYSTEMS, 2003, 2677 : 3 - 36
- [7] Intrusion-tolerant group management in enclaves [J]. INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, : 203 - 212
- [8] Secure intrusion-tolerant replication on the Internet [J]. INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 167 - 176
- [9] Building intrusion-tolerant secure software [J]. CGO 2005: INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, 2005, : 255 - 266
- [10] An architecture for adaptive intrusion-tolerant applications [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2006, 36 (11-12): : 1331 - 1354