Author:
Uemura Toshikazu,Dohi Tadashi,Kaio Naoto
Publisher
Springer Berlin Heidelberg
Reference27 articles.
1. Bai, Y., Vuong, S.: A survey of VoIP intrusions and intrusion detection systems. In: Proceedings of 6th International Conference on Advanced Communication Technology (ICACT 2004), pp. 317–322. IEEE CS Press, Los Alamitos (2004)
2. Chan, C.K., Pant, H.: Reliability and security modeling in upgrading wireless backbone networks. Bell Labs Technical Journal 8(4), 39–53 (2004)
3. Deswarte, Y., Blain, L., Fabre, J.C.: Intrusion tolerance in distributed computing systems. In: Proceedings of 1991 IEEE Symposium on Research in Security and Privacy, pp. 110–121. IEEE CS Press, Los Alamitos (1991)
4. Deswarte, Y., Powell, D.: Internet security: an intrusion torelance approach. Proceedings of the IEEE 94(2), 432–441 (2006)
5. Goseva-Popstojanova, K., Wang, F., Wang, R., Gong, F., Vaidyanathan, K., Trivedi, K., Muthusamy, B.: Characterizing intrusion tolerant systems using a state transition model. In: DARPA Information Survivability Conference and Exposition (DISCEX II), vol. 2, pp. 211–221 (2001)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献