Author:
Min Byoung Joon,Choi Joong Sup
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference9 articles.
1. M.A. Hiltunen, et al., Survivability through customization and adaptability: the cactus approach, in: DARPA Information Survivability Conference and Exposition, 0-7695-0490-6/99, 1999, pp. 294–306.
2. A.P. Moore, Attack modeling for information security and survivability, Technical Node No. CMU/SEI-2001-TN-001, CMU 2001.
3. Securing the US Defence Information Infrastructures: A Proposed Approach, Technical Report, National Security Agency, Defence Advanced Research Projects Agency, Office of the Assistant Secretary of Defence, 1998.
4. Reaching agreement in the presence of faults;Pease;J. ACM,1980
5. B. Randell, Dependability—Unifying Concept, Computer Security, Dependability and Assurance: From Needs to Solutions, 1998. ISBN 0-7695-0337-3/99.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Catch Me If You Can;Proceedings of the 5th ACM Workshop on Moving Target Defense;2018-01-15
2. Toward Trustworthy Web Services Coordination;Encyclopedia of Information Science and Technology, Fourth Edition;2018
3. Intrusion Tolerance Techniques;Encyclopedia of Information Science and Technology, Fourth Edition;2018
4. Adoption de l’open source pour la conception de systèmes d’information critiques : le cas Thales;Systèmes d'information & management;2017-02-20
5. Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism;Research in Attacks, Intrusions and Defenses;2014