共 50 条
- [1] Intrusion-tolerant group management in enclaves [J]. INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, : 203 - 212
- [2] Intrusion-tolerant enclaves [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 216 - 224
- [3] On the correctness of an intrusion-tolerant group communication protocol [J]. CORRECT HARDWARE DESIGN AND VERIFICATION METHODS, PROCEEDINGS, 2003, 2860 : 231 - 246
- [4] Formal verification of an intrusion-tolerant group membership protocol [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2003, E86D (12): : 2612 - 2622
- [5] Intrusion-tolerant intrusion detection system [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 476 - 483
- [6] Experiences with building an intrusion-tolerant group communication system [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2008, 38 (06): : 639 - 666
- [7] Distributed group membership algorithm in intrusion-tolerant system [J]. ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 511 - 515
- [8] Intrusion-Tolerant Autonomous Driving [J]. 2018 IEEE 21ST INTERNATIONAL SYMPOSIUM ON REAL-TIME DISTRIBUTED COMPUTING (ISORC 2018), 2018, : 130 - 133
- [9] Practical Intrusion-Tolerant Networks [J]. PROCEEDINGS 2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2016, 2016, : 45 - 56
- [10] An intrusion-tolerant mechanism for intrusion detection systems [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 319 - +