Survivable Network Systems: An Emerging Discipline
暂无分享,去创建一个
Nancy R. Mead | Richard C. Linger | Howard F. Lipson | David A. Fisher | Robert J. Ellison | Thomas A. Longstaff | T. Longstaff | N. Mead | R. Linger | R. Ellison | H. Lipson | D. Fisher
[1] Peter Neumann,et al. Safeware: System Safety and Computers , 1995, SOEN.
[2] Richard C. Linger. Systematic generation of stochastic diversity as an intrusion barrier in survivable systems software , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.
[3] Christof Ebert,et al. Dealing with nonfunctional requirements in large software systems , 1997, Ann. Softw. Eng..
[4] John D. Musa,et al. Software reliability - measurement, prediction, application , 1987, McGraw-Hill series in software engineering and technology.
[5] Rick Kazman,et al. The architecture tradeoff analysis method , 1998, Proceedings. Fourth IEEE International Conference on Engineering of Complex Computer Systems (Cat. No.98EX193).
[6] Nancy G. Leveson,et al. Safeware: System Safety and Computers , 1995 .
[7] Veena B. Mendiratta. Assessing the reliability impacts of software fault-tolerance mechanisms , 1996, Proceedings of ISSRE '96: 7th International Symposium on Software Reliability Engineering.
[8] Jerome H. Saltzer,et al. End-to-end arguments in system design , 1984, TOCS.
[9] C. Trammell,et al. Quantifying the reliability of software: statistical testing based on a usage model , 1995, Proceedings of Software Engineering Standards Symposium.
[10] Jon B. Weissman,et al. Building Secure and Reliable Network Applications [Book Review] , 1998, IEEE Concurrency.
[11] Kenneth P. Birman,et al. Building Secure and Reliable Network Applications , 1996 .
[12] Paul Clements,et al. Software architecture in practice , 1999, SEI series in software engineering.
[13] Nancy R. Mead,et al. Requirements definition for survivable network systems , 1998, Proceedings of IEEE International Symposium on Requirements Engineering: RE '98.
[14] Harlan D. Mills. Certifying the correctness of software , 1992, Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences.
[15] David A. Fisher,et al. Emergent algorithms-a new method for enhancing survivability in unbounded systems , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.
[16] Peter G. Neumann,et al. Effects of multilevel security on real-time applications , 1993, Proceedings of 9th Annual Computer Security Applications Conference.
[17] Leonard J. Bass,et al. Scenario-Based Analysis of Software Architecture , 1996, IEEE Softw..
[18] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[19] M. F.,et al. Bibliography , 1985, Experimental Gerontology.