1. On stochastic modeling for integrated security and dependability evaluation;Sallhammar;J. Netw.,2006
2. A method for modeling and quantifying the security attributes of intrusion tolerant systems;Madan;Perform. Eval.,2004
3. K. Goseva-Popstojanova, F. Wang, R. Wang, F. Gong, K. Vaidyanathan, K.S. Trivedi, B. Muthusamy, Characterizing intrusion tolerant systems using a state transition model, in: Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX II), vol. 2, 2001, pp. 211–221.
4. D. Wang, B. Madan, K.S. Trivedi, Security analysis of SITAR intrusion-tolerant system, in: Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems, 2003, pp. 23–32.
5. F. Stevens, T. Courtney, S. Singh, A. Agbaria, J.F. Meyer, W.H. Sanders, P. Pal, Model-based validation of an intrusion-tolerant information system, in: Proceedings of the 23rd Symposium on Reliable Distributed Systems (SRDS’04), Florianpolis, Brazil, October 2004, pp. 184–194.