-
1
-
-
0002538948
-
Storage Jamming
-
D.L. Spooner, S. A. Demurjian, and J.E. Dobson, eds., Chapman & Hall, London
-
J. McDermott and D. Goldschlag, “Storage Jamming,” Database Security IX: Status and Prospects, D.L. Spooner, S. A. Demurjian, and J.E. Dobson, eds., Chapman & Hall, London, 1996, pp. 365-381.
-
(1996)
Database Security IX: Status and Prospects
, pp. 365-381
-
-
McDermott, J.1
Goldschlag, D.2
-
2
-
-
0004026250
-
Fault Tolerance: Principles and Practice
-
2nd Ed., Springer-Verlag, Vienna
-
P.A. Lee and T. Anderson, Fault Tolerance: Principles and Practice, 2nd Ed., Springer-Verlag, Vienna, 1990.
-
(1990)
-
-
Lee, P.A.1
Anderson, T.2
-
3
-
-
0003997276
-
Predictably Dependable Computing Systems
-
eds., Springer-Verlag, Berlin
-
B. Randell et al., eds., Predictably Dependable Computing Systems, Springer-Verlag, Berlin, 1995.
-
(1995)
-
-
Randell, B.1
-
4
-
-
0003851050
-
Transaction Processing: Concepts and Techniques
-
Morgan Kaufmann, San Mateo, Calif.
-
J. Gray and A. Reuter, Transaction Processing: Concepts and Techniques, Morgan Kaufmann, San Mateo, Calif., 1993.
-
(1993)
-
-
Gray, J.1
Reuter, A.2
-
5
-
-
0004131498
-
Computer-Related Risks
-
Addison-Wesley, Reading, Mass.
-
P.G. Neumann, Computer-Related Risks, Addison-Wesley, Reading, Mass., 1995.
-
(1995)
-
-
Neumann, P.G.1
-
6
-
-
0030649084
-
Surviving Information Warfare Attacks on Databases
-
IEEE CS Press, Los Alamitos, Calif.
-
P. Ammann et al., “Surviving Information Warfare Attacks on Databases,” IEEE Symp. Security and Privacy (SP 97), IEEE CS Press, Los Alamitos, Calif., 1997, pp. 164-174.
-
(1997)
IEEE Symp. Security and Privacy (SP 97)
, pp. 164-174
-
-
Ammann, P.1
-
7
-
-
0003087020
-
Designing Masking Fault-Tolerance via Nonmasking Fault-Tolerance
-
A. Arora and S.S. Kulkarni, “Designing Masking Fault-Tolerance via Nonmasking Fault-Tolerance,” IEEE Trans. Software Eng., Vol. 24, No. 6, 1998, pp. 435-450.
-
(1998)
IEEE Trans. Software Eng.
, vol.24
, Issue.6
, pp. 435-450
-
-
Arora, A.1
Kulkarni, S.S.2
-
8
-
-
0023266943
-
A Comparison of Commercial and Military Computer Security Policies
-
IEEE CS Press, Los Alamitos, Calif.
-
D.D. Clark and D.R. Wilson, “A Comparison of Commercial and Military Computer Security Policies,” IEEE Symp. Security and Privacy (SP 87), IEEE CS Press, Los Alamitos, Calif., 1987, pp. 184-194.
-
(1987)
IEEE Symp. Security and Privacy (SP 87)
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
9
-
-
0029718782
-
Towards a Model of Storage Jamming
-
IEEE CS Press, Los Alamitos, Calif.
-
J. McDermott and D. Goldschlag, “Towards a Model of Storage Jamming,” Proc. IEEE Computer Security Foundations Workshop, IEEE CS Press, Los Alamitos, Calif., 1996, pp. 176-185.
-
(1996)
Proc. IEEE Computer Security Foundations Workshop
, pp. 176-185
-
-
McDermott, J.1
Goldschlag, D.2
-
10
-
-
0027609384
-
A Survey of Intrusion Detection Techniques
-
T.F. Lunt, “A Survey of Intrusion Detection Techniques,” Computers & Security, Vol. 12, No. 4, 1993, pp. 405-418.
-
(1993)
Computers & Security
, vol.12
, Issue.4
, pp. 405-418
-
-
Lunt, T.F.1
|