Survivability of Network Information System: An Overview
暂无分享,去创建一个
[1] Nancy R. Mead,et al. Requirements definition for survivable network systems , 1998, Proceedings of IEEE International Symposium on Requirements Engineering: RE '98.
[2] Ivar Jacobson,et al. The Unified Modeling Language User Guide , 1998, J. Database Manag..
[3] Joon S. Park,et al. Static vs. dynamic recovery models for survivable distributed systems , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[4] David H. Ackley,et al. Building diverse computer systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).
[5] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[6] Vickie R. Westmark. A definition for information system survivability , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[7] Deep Medhi,et al. Multi-layered network survivability-models, analysis, architecture, framework and implementation: an overview , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[8] Nancy R. Mead,et al. Survivable Network System Analysis: A Case Study , 1999, IEEE Softw..
[9] Stephanie Forrest,et al. Information Immune Systems , 2003, Genetic Programming and Evolvable Machines.
[10] Kevin J. Sullivan,et al. Towards a rigorous definition of information system survivability , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[11] Tang Hui-lin. Research on survivability analysis of network system , 2007 .
[12] Jeffrey O. Kephart,et al. Blueprint for a Computer Immune System , 1999 .
[13] William L. Fithen,et al. State of the Practice of Intrusion Detection Technologies , 2000 .
[14] Matti A. Hiltunen,et al. Survivability through customization and adaptability: the Cactus approach , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[15] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[16] N. Hanebutte,et al. Low-Level Network Attack Recognition : A Signature-Based Approach ∗ , 2001 .
[17] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[18] Thomas Spyrou,et al. Intention modelling: approximating computer user intentions for detection and prediction of intrusions , 1996, SEC.