1. Stavridou V, Dutertre B, Riemenschneider R A,et al. Intrusion Tolerant Software Architectures.Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX II'01) Volume II. Anaheim, California, June 12–14, 2001, 1230–1241.
2. Deswarte Y, Blain L, Fabre J C. Intrusion Tolerance in Distributed Computing Systems.Proceedings of the International Symposium on Security and Privacy. New York: IEEE Press, May 1991. 110–121.
3. Wang F, Uppalli R, Killian C. Analysis of Techniques For Building Intrusion Tolerant Server Systems.Proceedings of IEEE Military Communications Conference (MILCOM 2003). Boston, MA, Oct 13–16, 2003, 729–734.
4. Shaw M, Garlan D.Software Architecture: Perspectives on An Emerging Discipline. New Jersey: Prentice Hall Inc, 1996. 30–31.
5. Miller B P, Fredrikson L, So B. An Empirical Study of the Reliability of UNIX Utilities.Communications of the ACM, December 1990,33(12): 33–44.