共 50 条
- [21] An intrusion-tolerant mechanism for intrusion detection systems ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 319 - +
- [22] A novel, adaptive replica control protocol for distributed intrusion-tolerant environments 2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 163 - +
- [23] Intrusion-tolerant architectures:: Concepts and design ARCHITECTING DEPENDABLE SYSTEMS, 2003, 2677 : 3 - 36
- [25] An adaptive intrusion-tolerant approach to protecting operation security of cryptographic protocols Gaojishu Tongxin/Chinese High Technology Letters, 2009, 19 (07): : 706 - 712
- [26] Design of a Lightweight Intrusion-Tolerant System for Highly Available Servers KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS, 2017, 112 : 2319 - 2327
- [27] Secure intrusion-tolerant replication on the Internet INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 167 - 176
- [28] Intrusion-tolerant group management in enclaves INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, : 203 - 212
- [29] Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid 2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2018, : 255 - 266
- [30] A Scalable and Intrusion-tolerant Digital Time-stamping System 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2357 - 2363