共 50 条
- [1] Intrusion-tolerant architectures:: Concepts and design [J]. ARCHITECTING DEPENDABLE SYSTEMS, 2003, 2677 : 3 - 36
- [2] Intrusion-tolerant intrusion detection system [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 476 - 483
- [3] An approach for availability evaluation of intrusion-tolerant server architectures [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 252 - 258
- [4] Dependability and performance evaluation of intrusion-tolerant server architectures [J]. DEPENDABLE COMPUTING, 2003, 2847 : 81 - 101
- [6] An intrusion-tolerant password authentication system [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 110 - 118
- [7] Intrusion-tolerant enclaves [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 216 - 224
- [8] BackupIT: An Intrusion-Tolerant Cooperative Backup System [J]. PROCEEDINGS OF THE 8TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, 2009, : 724 - +
- [9] Probabilistic validation of an intrusion-tolerant replication system [J]. 2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 615 - 624
- [10] Availability analysis and comparison of different intrusion-tolerant systems [J]. CONTENT COMPUTING, PROCEEDINGS, 2004, 3309 : 161 - 166