A Method to Implement a Denial of Service Protection Base
暂无分享,去创建一个
[1] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[2] Donn B. Parker,et al. A New Framework for Information Security to Avoid Information Anarchy , 1995 .
[3] Roger M. Needham,et al. Denial of service , 1993, CCS '93.
[4] Jonathan K. Millen,et al. A resource allocation model for denial of service , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Virgil D. Gligor,et al. A Note on the Denial-of-Service Problem , 1983, 1983 IEEE Symposium on Security and Privacy.
[6] S. Jajodia,et al. Information Security: An Integrated Collection of Essays , 1994 .
[7] Maryline Chetto,et al. Some Results of the Earliest Deadline Scheduling Algorithm , 1989, IEEE Transactions on Software Engineering.
[8] Yuliang Zheng,et al. Layered Protection of Availability , 1997, PACIS.
[9] Glenn H. MacEwen,et al. A logic for reasoning about security , 1992, TOCS.
[10] K. J. Keus,et al. Availability: theory and fundamentals for practical evaluation and use , 1994, Tenth Annual Computer Security Applications Conference.