A Self-healing Mechanism for an Intrusion Tolerance System
暂无分享,去创建一个
[1] Charles P. Shelton,et al. A framework for scalable analysis and design of system-wide graceful degradation in distributed embedded systems , 2003, Proceedings of the Eighth International Workshop on Object-Oriented Real-Time Dependable Systems, 2003. (WORDS 2003)..
[2] Feiyi Wang,et al. Analysis of techniques for building intrusion tolerant server systems , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[3] Kyung-Whan Lee,et al. Classification of the Intrusion Tolerant Systems and Integrated Framework for Survivability Enhancement , 2003 .
[4] Charles C. Palmer,et al. Security in an autonomic computing environment , 2003, IBM Syst. J..
[5] Leonard Kleinrock,et al. Queueing Systems: Volume I-Theory , 1975 .
[6] Bharat B. Madan,et al. Modeling and quantification of security attributes of software systems , 2002, Proceedings International Conference on Dependable Systems and Networks.
[7] Kishor S. Trivedi,et al. Characterizing intrusion tolerant systems using a state transition model , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[8] Bharat B. Madan,et al. A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.
[9] Kishor S. Trivedi. Probability and Statistics with Reliability, Queuing, and Computer Science Applications , 1984 .
[10] Jeffrey O. Kephart,et al. The Vision of Autonomic Computing , 2003, Computer.
[11] Philip Koopman,et al. Elements of the Self-Healing System Problem Space , 2003 .
[12] Feiyi Wang,et al. SITAR: a scalable intrusion-tolerant architecture for distributed services , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[13] James C. Reynolds,et al. On-line intrusion detection and attack prevention using diversity, generate-and-test, and generalization , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[14] Leonard Kleinrock,et al. Theory, Volume 1, Queueing Systems , 1975 .
[15] Kishor S. Trivedi,et al. Security analysis of SITAR intrusion tolerance system , 2003, SSRS '03.