1. A method for modeling and quantifying the security attributes of intrusion tolerant systems
2. , , , . SITAR: a scalable intrusion-tolerant architecture for distributed services. Proceedings of the Foundations of Intrusion Tolerant Systems (OASIS) 2003; 359–367.
3. An approach to intrusion tolerance for mission-critical services using adaptability and diverse replication
4. Backtracking intrusions
5. , , , , . Storage-based intrusion detection: watching storage activity for suspicious behaviour. Proceedings of the 12th USENIX Security Symposium, Washington, DC, August 2003.