Intrusion tolerant systems
暂无分享,去创建一个
[1] Andrew P. Moore,et al. TRIAD: a framework for survivability architecting , 2003, SSRS '03.
[2] Andrew S. Tanenbaum,et al. Distributed systems: Principles and Paradigms , 2001 .
[3] Jingtao Yao,et al. An Enhanced Support Vector Machine Model for Intrusion Detection , 2006, RSKT.
[4] James E. Just,et al. Review and analysis of synthetic diversity for breaking monocultures , 2004, WORM '04.
[5] David Evans,et al. A biological programming model for self-healing , 2003, SSRS '03.
[6] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[7] James C. Reynolds,et al. Continual repair for windows using the event log , 2003, SSRS '03.
[8] Peng Liu,et al. Incentive-based modeling and inference of attacker intent, objectives, and strategies , 2003, CCS '03.
[9] Karl Aberer,et al. Managing trust in a peer-2-peer information system , 2001, CIKM '01.
[10] Marc Dacier,et al. MAFTIA (Malicious− and Accidental− Fault Tolerance for Internet Applications , 2001 .
[11] Jens Tölle,et al. A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs , 2006, DIMVA.
[12] Rong Wang. Intrusion Tolerant Systems Characterization and Acceptance Monitor Design , 2001 .
[13] Michael J. Fischer,et al. The Consensus Problem in Unreliable Distributed Systems (A Brief Survey) , 1983, FCT.
[14] Fred B. Schneider,et al. COCA: a secure distributed online certification authority , 2002 .
[15] Kotagiri Ramamohanarao,et al. Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.
[16] Jingtao Yao,et al. A study on fuzzy intrusion detection , 2005, SPIE Defense + Commercial Sensing.
[17] Paulo Veríssimo. Intrusion Tolerance: Concepts and Design Principles. A Tutorial , 2002 .