共 50 条
- [21] BackupIT: An Intrusion-Tolerant Cooperative Backup System [J]. PROCEEDINGS OF THE 8TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, 2009, : 724 - +
- [22] Probabilistic validation of an intrusion-tolerant replication system [J]. 2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 615 - 624
- [23] DiveInto: Supporting Diversity in Intrusion-Tolerant Systems [J]. 2011 30TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2011, : 137 - 146
- [24] On the effects of finite memory on intrusion-tolerant systems [J]. 13TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2007, : 401 - 404
- [25] On the correctness of an intrusion-tolerant group communication protocol [J]. CORRECT HARDWARE DESIGN AND VERIFICATION METHODS, PROCEEDINGS, 2003, 2860 : 231 - 246
- [29] An approach for availability evaluation of intrusion-tolerant server architectures [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 252 - 258
- [30] Formal verification of an intrusion-tolerant group membership protocol [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2003, E86D (12): : 2612 - 2622