Open implementation toolkit for building survivable applications
暂无分享,去创建一个
[1] William H. Sanders,et al. Proteus: a flexible infrastructure to implement adaptive fault tolerance in AQuA , 1999, Dependable Computing for Critical Applications 7.
[2] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.
[3] John McHugh,et al. Architectural Approaches to Information Survivability , 1997 .
[4] Douglas C. Schmidt,et al. The design of the TAO real-time object request broker , 1998, Comput. Commun..
[5] John A. Zinky,et al. Specifying and measuring quality of service in distributed object systems , 1998, Proceedings First International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC '98).
[6] Shyhtsun Felix Wu,et al. Architecture Design of a Scalable Intrusion Detection System for the Emerging Network Infrastructure , 1997 .
[7] John A. Zinky,et al. PASS-a service for efficient large scale dissemination of time varying data using CORBA , 1999, Proceedings. 19th IEEE International Conference on Distributed Computing Systems (Cat. No.99CB37003).
[8] John A. Zinky,et al. An object-level gateway supporting integrated-property quality of service , 1999, Proceedings 2nd IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC'99) (Cat. No.99-61702).
[9] Daniel F. Sterne,et al. Scalable Access Control for Distributed Object Systems , 1999, USENIX Security Symposium.
[10] Joseph P. Loyall,et al. Building Adaptive and Agile Applications Using Intrusion Detection and Response , 2000, NDSS.
[11] John A. Zinky,et al. Architectural Support for Quality of Service for CORBA Objects , 1997, Theory Pract. Object Syst..
[12] Salvatore J. Stolfo,et al. JAM: Java Agents for Meta-Learning over Distributed Databases , 1997, KDD.
[13] Mustaque Ahamad,et al. Scalable Consistency Protocols for Distributed Services , 1999, IEEE Trans. Parallel Distributed Syst..
[14] John A. Zinky,et al. QoS Aspect Languages and Their Runtime Integration , 1998, LCR.
[15] Peter G. Neumann,et al. Experience with EMERALD to Date , 1999, Workshop on Intrusion Detection and Network Monitoring.
[16] William H. Sanders,et al. AQuA: an adaptive architecture that provides dependable distributed objects , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).
[17] Stephanie Forrest,et al. Computer immunology , 1997, CACM.
[18] Karl N. Levitt,et al. GrIDS A Graph-Based Intrusion Detection System for Large Networks , 1996 .
[19] Eugene H. Spafford,et al. The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.