共 50 条
- [1] Intrusion-tolerant group management in enclaves [J]. INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, : 203 - 212
- [2] Intrusion-tolerant group management in enclaves -: (Transcript of discussion) [J]. SECURITY PROTOCOLS, 2002, 2467 : 213 - 216
- [3] Intrusion-tolerant intrusion detection system [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 476 - 483
- [4] Intrusion-Tolerant Autonomous Driving [J]. 2018 IEEE 21ST INTERNATIONAL SYMPOSIUM ON REAL-TIME DISTRIBUTED COMPUTING (ISORC 2018), 2018, : 130 - 133
- [5] Practical Intrusion-Tolerant Networks [J]. PROCEEDINGS 2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2016, 2016, : 45 - 56
- [6] An intrusion-tolerant mechanism for intrusion detection systems [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 319 - +
- [7] An architecture for an adaptive intrusion-tolerant server [J]. SECURITY PROTOCOLS, 2004, 2845 : 158 - 177
- [8] Intrusion-tolerant architectures:: Concepts and design [J]. ARCHITECTING DEPENDABLE SYSTEMS, 2003, 2677 : 3 - 36
- [9] Secure intrusion-tolerant replication on the Internet [J]. INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 167 - 176
- [10] Building intrusion-tolerant secure software [J]. CGO 2005: INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, 2005, : 255 - 266