Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks Via Semi-Markov Cost Models
暂无分享,去创建一个
[1] Paulo Veríssimo,et al. Intrusion-tolerant middleware: the road to automatic security , 2006, IEEE Security & Privacy.
[2] Tomas Olovsson,et al. A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior , 1997, IEEE Trans. Software Eng..
[3] David Wright,et al. Towards Operational Measures of Computer Security , 1993, J. Comput. Secur..
[4] Rodolphe Ortalo,et al. Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..
[5] William H. Sanders,et al. Model-based validation of an intrusion-tolerant information system , 2004, Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004..
[6] Miguel Correia,et al. Intrusion-Tolerant Architectures: Concepts and Design , 2002, WADS.
[7] M. Imaizumi,et al. RELIABILITY ANALYSIS OF A NETWORK SERVER SYSTEM WITH ILLEGAL ACCESS , 2006 .
[8] Rogério de Lemos,et al. Architecting Dependable Systems VI , 2009, WADS.
[9] Rabih Zbib,et al. Intrusion tolerant middleware , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[10] Peter Y. A. Ryan,et al. A qualitative analysis of the intrusion-tolerance capabilities of the MAFTIA architecture , 2004, International Conference on Dependable Systems and Networks, 2004.
[11] Dieter Gollmann,et al. Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings , 2006, ESORICS.
[12] Yves Deswarte,et al. Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[13] William H. Sanders,et al. Dependability and Performance Evaluation of Intrusion-Tolerant Server Architectures , 2003, LADC.
[14] Lee Garber,et al. Denial-of-Service Attacks Rip the Internet , 2000, Computer.
[15] Bharat B. Madan,et al. A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.
[16] Peng Liu,et al. Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System , 2006, ESORICS.
[17] Bharat B. Madan,et al. Modeling and quantification of security attributes of software systems , 2002, Proceedings International Conference on Dependable Systems and Networks.
[18] Andrew R. McGee,et al. Optimal availability and security for IMS-based VoIP networks , 2006, Bell Labs Technical Journal.
[19] William H. Sanders,et al. Probabilistic validation of an intrusion-tolerant replication system , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..