메뉴 건너뛰기




Volumn 8, Issue 6, 2004, Pages 25-33

Adaptive cyberdefense for survival and intrusion tolerance

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER NETWORKS; COMPUTER SYSTEM FIREWALLS; DISTRIBUTED COMPUTER SYSTEMS; HIGH LEVEL LANGUAGES; MIDDLEWARE; QUALITY OF SERVICE; TELECOMMUNICATION TRAFFIC;

EID: 11044229066     PISSN: 10897801     EISSN: None     Source Type: Journal    
DOI: 10.1109/MIC.2004.54     Document Type: Article
Times cited : (30)

References (17)
  • 1
    • 0035728071 scopus 로고    scopus 로고
    • "Defense Enabling Using Advanced Middleware: An Example"
    • IEEE Press
    • P. Pal et al., "Defense Enabling Using Advanced Middleware: An Example," Proc. Military Comm. Conf. (MILCOM), vol. 1, IEEE Press, 2001, pp. 92-101.
    • (2001) Proc. Military Comm. Conf. (MILCOM) , vol.1 , pp. 92-101
    • Pal, P.1
  • 8
    • 35248873039 scopus 로고    scopus 로고
    • "Runtime Performance Modeling and Measurement of Adaptive Distributed Object Applications"
    • LNCS 2519, Springer-Verlag
    • J. Zinky et al., "Runtime Performance Modeling and Measurement of Adaptive Distributed Object Applications," Proc. Int'l Symp. Distributed Object and Applications (DOA), LNCS 2519, Springer-Verlag, 2002, pp. 75-77.
    • (2002) Proc. Int'l Symp. Distributed Object and Applications (DOA) , pp. 75-77
    • Zinky, J.1
  • 10
    • 3242885163 scopus 로고    scopus 로고
    • "Building Adaptive Distributed Applications with Middleware and Aspects"
    • ACM Press
    • G. Duzan et al., "Building Adaptive Distributed Applications with Middleware and Aspects," Proc. Int'l Conf. Aspect-Oriented Software Development (AOSD), ACM Press, 2004, pp. 66-73.
    • (2004) Proc. Int'l Conf. Aspect-Oriented Software Development (AOSD) , pp. 66-73
    • Duzan, G.1
  • 11
    • 84988573115 scopus 로고
    • "The Design and Implementation of Tripwire: A Filesystem Integrity Checker"
    • ACM Press
    • G. Kim and E. Spafford, "The Design and Implementation of Tripwire: A Filesystem Integrity Checker," Proc. 2nd ACM Conf. Computer and Comm. Security, ACM Press, 1994, pp. 18-29.
    • (1994) Proc. 2nd ACM Conf. Computer and Comm. Security , pp. 18-29
    • Kim, G.1    Spafford, E.2
  • 12
    • 33746568331 scopus 로고    scopus 로고
    • "Linux Advanced Routing and Traffic Control How-to"
    • B. Hubert et al., "Linux Advanced Routing and Traffic Control How-to," 2003, http://ds9a.nl/2.4Networking/.
    • (2003)
    • Hubert, B.1
  • 13
    • 84966732757 scopus 로고    scopus 로고
    • "Securing QoS: Threats to RSVP Messages and Their Countermeasures"
    • IEEE Press
    • T.-L. Wu et al., "Securing QoS: Threats to RSVP Messages and Their Countermeasures," Proc. 7th Int'l Workshop on Quality of Service, IEEE Press, 1999, pp. 62-64.
    • (1999) Proc. 7th Int'l Workshop on Quality of Service , pp. 62-64
    • Wu, T.-L.1
  • 15
    • 11044238642 scopus 로고    scopus 로고
    • tech. report 1311, BBN Technologies, May
    • B. Nelson et al., APOD Experiment 1: Final Report, tech. report 1311, BBN Technologies, May 2002; http://apod.bbn.com.
    • (2002) Apod Experiment 1: Final Report
    • Nelson, B.1
  • 16
    • 11044232617 scopus 로고    scopus 로고
    • tech. report 1326, BBN Technologies, Sept
    • B. Nelson et al., APOD Experiment 2: Final Report, tech. report 1326, BBN Technologies, Sept. 2002; http://apod.bbn.com.
    • (2002) Apod Experiment 2: Final Report
    • Nelson, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.