-
1
-
-
84859678210
-
-
2001 FCC Outage Reports, 〈http://www.fcc.gov/Bureaus/Engineering_ TechnoIogy/Filings/Network_Outage/2001/ reports〉.
-
2001 FCC Outage Reports
-
-
-
2
-
-
0034501876
-
Windows of vulnerability: A case study analysis
-
W. A. Arbaugh, W. L. Fithen, and J. McHugh, "Windows of Vulnerability: A Case Study Analysis," IEEE Computer 33:12 (2000), 52-59.
-
(2000)
IEEE Computer
, vol.33
, Issue.12
, pp. 52-59
-
-
Arbaugh, W.A.1
Fithen, W.L.2
McHugh, J.3
-
3
-
-
84889396610
-
-
John Wiley, New York, NY
-
G. Bolch, S. Greiner, H. de Meer, and K. S. Trivedi, Queueing Networks and Markov Chains: Modeling and Performance Evaluation with Computer Science Applications, John Wiley, New York, NY, 1998.
-
(1998)
Queueing Networks and Markov Chains: Modeling and Performance Evaluation with Computer Science Applications
-
-
Bolch, G.1
Greiner, S.2
De Meer, H.3
Trivedi, K.S.4
-
4
-
-
0029734440
-
Reliability evaluation: A field experience from Motorola's cellular base transceiver systems
-
Las Vegas, NV
-
R. Bothwell, R. Donthamsetty, Z. Kania, and R. Wesoloski, "Reliability Evaluation: A Field Experience from Motorola's Cellular Base Transceiver Systems." Proc. of the Reliability and Maintainability Symposium (Las Vegas, NV, 1996), pp. 348-359.
-
(1996)
Proc. of the Reliability and Maintainability Symposium
, pp. 348-359
-
-
Bothwell, R.1
Donthamsetty, R.2
Kania, Z.3
Wesoloski, R.4
-
6
-
-
0035020738
-
Reliability/availability modeling and prediction for E-commerce and other Internet information systems
-
Philadelphia
-
M. Hecht, "Reliability/Availability Modeling and Prediction for E-Commerce and Other Internet Information Systems," Proc. of the Reliability and Maintainability Symposium (Philadelphia, 2001), pp. 176-182.
-
(2001)
Proc. of the Reliability and Maintainability Symposium
, pp. 176-182
-
-
Hecht, M.1
-
7
-
-
29744445436
-
Calculation of system availability using traffic statistics
-
D. S. Jackson and F. K. Kunzinger, "Calculation of System Availability Using Traffic Statistics," Bell Labs Tech. J. 7:3 (2003), 139-150.
-
(2003)
Bell Labs Tech. J.
, vol.7
, Issue.3
, pp. 139-150
-
-
Jackson, D.S.1
Kunzinger, F.K.2
-
9
-
-
85084161486
-
Inferring Internet denial-of-service activities
-
Washington, DC
-
D. Moore, G. Voelker, and S. Savage, "Inferring Internet Denial-of-Service Activities," Proc. of the 10th USENIX Security Symposium (Washington, DC, 2001), 〈http://www.usenix.org/events/sec01/moore/ moore.pdf〉
-
(2001)
Proc. of the 10th USENIX Security Symposium
-
-
Moore, D.1
Voelker, G.2
Savage, S.3
-
10
-
-
0003960126
-
-
McGraw-Hill, New York, NY
-
J. D. Musa, A. Iannino, K. Okumoto, Software Reliability: Measurement, Prediction, Application, McGraw-Hill, New York, NY, 1987.
-
(1987)
Software Reliability: Measurement, Prediction, Application
-
-
Musa, J.D.1
Iannino, A.2
Okumoto, K.3
-
12
-
-
0004133805
-
-
Prentice-Hall PTR, Upper Saddle River, NJ
-
G. F. Pfister, In Search of Clusters, Prentice-Hall PTR, Upper Saddle River, NJ, 1998.
-
(1998)
Search of Clusters
-
-
Pfister, G.F.1
-
13
-
-
84859691726
-
-
Security Patches, 〈http://w\vw.wemanageservers.com/managed_ security/security_patches/security_patches. html〉
-
Security Patches
-
-
-
14
-
-
84859696623
-
-
May 20, doc id 51340
-
Security Vulnerability in Sun Cluster 2.2, May 20, 2003, doc id 51340, 〈http://sunsolvel.sun.com/pub-cgi/retrieve.pl? doc= fsalert%2F51340&zone_32=category%3A security〉
-
(2003)
Security Vulnerability in Sun Cluster 2.2
-
-
-
15
-
-
33750312973
-
Secure to the core
-
G. Shipley, "Secure to the Core," Network Computing 14:1 (2003), 34-57.
-
(2003)
Network Computing
, vol.14
, Issue.1
, pp. 34-57
-
-
Shipley, G.1
-
19
-
-
33750370578
-
-
GR-512-CORE, Sect. 12
-
Telcordia Technologies, LSSGR: Reliability, GR-512-CORE, Sect. 12, Iss. 2, 1998.
-
(1998)
LSSGR: Reliability
, Issue.2
-
-
-
21
-
-
0036152676
-
Providing fault tolerance in wireless access networks
-
D. Tipper, T. Dahlberg, H. Shin, and C. Charnsripinyo, "Providing Fault Tolerance in Wireless Access Networks," IEEE Commun. Mag. 40:1 (2002), 58-64.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.1
, pp. 58-64
-
-
Tipper, D.1
Dahlberg, T.2
Shin, H.3
Charnsripinyo, C.4
-
22
-
-
84859689465
-
-
TKN Telecommunication Networks Group, SeQoMo Project, 〈http://vvvvw-tkn.ee. tu-berlin.de/research/SeQoMo/〉.
-
-
-
|