메뉴 건너뛰기




Volumn 8, Issue 4, 2004, Pages 39-53

Reliability and security modeling in upgrading wireless backbone networks

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK RELIABILITY; PACKET TANDEM SWITCH; SERVICE PROVIDER;

EID: 33744831576     PISSN: 10897089     EISSN: 15387305     Source Type: Journal    
DOI: 10.1002/bltj.10085     Document Type: Article
Times cited : (13)

References (22)
  • 1
    • 84859678210 scopus 로고    scopus 로고
    • 2001 FCC Outage Reports, 〈http://www.fcc.gov/Bureaus/Engineering_ TechnoIogy/Filings/Network_Outage/2001/ reports〉.
    • 2001 FCC Outage Reports
  • 2
    • 0034501876 scopus 로고    scopus 로고
    • Windows of vulnerability: A case study analysis
    • W. A. Arbaugh, W. L. Fithen, and J. McHugh, "Windows of Vulnerability: A Case Study Analysis," IEEE Computer 33:12 (2000), 52-59.
    • (2000) IEEE Computer , vol.33 , Issue.12 , pp. 52-59
    • Arbaugh, W.A.1    Fithen, W.L.2    McHugh, J.3
  • 6
    • 0035020738 scopus 로고    scopus 로고
    • Reliability/availability modeling and prediction for E-commerce and other Internet information systems
    • Philadelphia
    • M. Hecht, "Reliability/Availability Modeling and Prediction for E-Commerce and Other Internet Information Systems," Proc. of the Reliability and Maintainability Symposium (Philadelphia, 2001), pp. 176-182.
    • (2001) Proc. of the Reliability and Maintainability Symposium , pp. 176-182
    • Hecht, M.1
  • 7
    • 29744445436 scopus 로고    scopus 로고
    • Calculation of system availability using traffic statistics
    • D. S. Jackson and F. K. Kunzinger, "Calculation of System Availability Using Traffic Statistics," Bell Labs Tech. J. 7:3 (2003), 139-150.
    • (2003) Bell Labs Tech. J. , vol.7 , Issue.3 , pp. 139-150
    • Jackson, D.S.1    Kunzinger, F.K.2
  • 9
    • 85084161486 scopus 로고    scopus 로고
    • Inferring Internet denial-of-service activities
    • Washington, DC
    • D. Moore, G. Voelker, and S. Savage, "Inferring Internet Denial-of-Service Activities," Proc. of the 10th USENIX Security Symposium (Washington, DC, 2001), 〈http://www.usenix.org/events/sec01/moore/ moore.pdf〉
    • (2001) Proc. of the 10th USENIX Security Symposium
    • Moore, D.1    Voelker, G.2    Savage, S.3
  • 12
    • 0004133805 scopus 로고    scopus 로고
    • Prentice-Hall PTR, Upper Saddle River, NJ
    • G. F. Pfister, In Search of Clusters, Prentice-Hall PTR, Upper Saddle River, NJ, 1998.
    • (1998) Search of Clusters
    • Pfister, G.F.1
  • 13
    • 84859691726 scopus 로고    scopus 로고
    • Security Patches, 〈http://w\vw.wemanageservers.com/managed_ security/security_patches/security_patches. html〉
    • Security Patches
  • 14
    • 84859696623 scopus 로고    scopus 로고
    • May 20, doc id 51340
    • Security Vulnerability in Sun Cluster 2.2, May 20, 2003, doc id 51340, 〈http://sunsolvel.sun.com/pub-cgi/retrieve.pl? doc= fsalert%2F51340&zone_32=category%3A security〉
    • (2003) Security Vulnerability in Sun Cluster 2.2
  • 15
    • 33750312973 scopus 로고    scopus 로고
    • Secure to the core
    • G. Shipley, "Secure to the Core," Network Computing 14:1 (2003), 34-57.
    • (2003) Network Computing , vol.14 , Issue.1 , pp. 34-57
    • Shipley, G.1
  • 19
    • 33750370578 scopus 로고    scopus 로고
    • GR-512-CORE, Sect. 12
    • Telcordia Technologies, LSSGR: Reliability, GR-512-CORE, Sect. 12, Iss. 2, 1998.
    • (1998) LSSGR: Reliability , Issue.2
  • 21
  • 22
    • 84859689465 scopus 로고    scopus 로고
    • TKN Telecommunication Networks Group, SeQoMo Project, 〈http://vvvvw-tkn.ee. tu-berlin.de/research/SeQoMo/〉.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.