메뉴 건너뛰기




Volumn 2001-May, Issue , 2001, Pages 307-317

Survivability analysis of networked systems

Author keywords

[No Author keywords available]

Indexed keywords

COST-BENEFITS ANALYSIS; FAILURE EVENTS; GLOBAL ANALYSIS; INTRUSION EVENTS; NETWORKED SYSTEMS; RELIABILITY BENEFITS; SCENARIO GRAPHS; SURVIVABILITY ANALYSIS; SYSTEM MODELS; SYSTEMATIC METHOD; LATENCY ANALYSIS; SYSTEM SURVIVABILITY;

EID: 0035001146     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSE.2001.919104     Document Type: Conference Paper
Times cited : (109)

References (19)
  • 3
    • 0032131465 scopus 로고    scopus 로고
    • Model checking for a probabilistic branching time logic with faimess
    • C. Baier and M. Kwiatkowska. Model checking for a probabilistic branching time logic with faimess. Distributed Computing, 11:125-155, 1998.
    • (1998) Distributed Computing , vol.11 , pp. 125-155
    • Baier, C.1    Kwiatkowska, M.2
  • 4
    • 0022769976 scopus 로고
    • Graph-based algorithms for boolean function manipulation
    • C Aug
    • R. E. Bryant. Graph-based algorithms for boolean function manipulation. IEEETrans. Comput., C-35(8):677-691, Aug. 1986.
    • (1986) IEEETrans. Comput. , vol.35 , Issue.8 , pp. 677-691
    • Bryant, R.E.1
  • 6
    • 84976740260 scopus 로고
    • The complexity of probabilistic verification
    • C. Courcoubetis and M. Yannakakis. The complexity of probabilistic verification. Journal of ACM, 42(4):857-907, 1995.
    • (1995) Journal of ACM , vol.42 , Issue.4 , pp. 857-907
    • Courcoubetis, C.1    Yannakakis, M.2
  • 9
    • 0032667966 scopus 로고    scopus 로고
    • Survivability network system analysis: A case study
    • July/August
    • R. Ellison, R. Linger, T. Longstaff, and N. Mead. Survivability network system analysis: A case study. IEEE Sofware, 16/4, July/August 1999.
    • (1999) IEEE Sofware , vol.16 , Issue.4
    • Ellison, R.1    Linger, R.2    Longstaff, T.3    Mead, N.4
  • 12
  • 13
    • 4243454421 scopus 로고    scopus 로고
    • Technical Report CS-97-27, Department of Computer Science, University of Virginia, Charlottesville, VA 22903, December
    • J. Knight, M. Elder, J. Flinn, and P. Man. Summaries of three critical infrastructure applications. Technical Report CS-97-27, Department of Computer Science, University of Virginia, Charlottesville, VA 22903, December 1997.
    • (1997) Summaries of Three Critical Infrastructure Applications
    • Knight, J.1    Elder, M.2    Flinn, J.3    Man, P.4
  • 15
    • 85011825628 scopus 로고
    • Proving time bounds for randomized distributed algorithms
    • N. Lynch, I. Saias, and R. Segala. Proving time bounds for randomized distributed algorithms. In Proceedings PODC, pages 314-323, 1994.
    • (1994) Proceedings PODC , pp. 314-323
    • Lynch, N.1    Saias, I.2    Segala, R.3
  • 16
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Sept/Oct
    • R. Ortalo, Y. Deswarte, and M. Kaaniche. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactionson Software Engineering, 25/5:633450, Sept/Oct 1999.
    • (1999) IEEE Transactionson Software Engineering , vol.25 , Issue.5 , pp. 633450
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 18
    • 49149133038 scopus 로고
    • A temporal logic of concurrent programs
    • A. Pnueli. A temporal logic of concurrent programs. Theoretical Comput.Sci., 13:45-60, 1981.
    • (1981) Theoretical Comput.Sci. , vol.13 , pp. 45-60
    • Pnueli, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.