메뉴 건너뛰기




Volumn Part F129230, Issue , 1998, Pages 122-133

Tolerating penetrations and insider attacks by requiring independent corroboration

Author keywords

Fault tolerance; Information survivability; Security; Trust models

Indexed keywords

SECURITY OF DATA;

EID: 33745631135     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/310889.310926     Document Type: Conference Paper
Times cited : (4)

References (18)
  • 3
    • 0026374073 scopus 로고
    • Bayesian networks without tears
    • Chamiak, E. Bayesian Networks without Tears. AI Magazine, 12(4) (1991).
    • (1991) AI Magazine , vol.12 , Issue.4
    • Chamiak, E.1
  • 7
    • 34249761849 scopus 로고
    • Learning Bayesian networks: The combination of knowledge and statistical data
    • Heckerman, D., Geiger, D., and Chickering, D.M. Learning Bayesian networks: The combination of knowledge and statistical data. Machine Learning, v. 20, 1995
    • (1995) Machine Learning , vol.20
    • Heckerman, D.1    Geiger, D.2    Chickering, D.M.3
  • 10
    • 0003391330 scopus 로고
    • Probabilistic reasoning in intelligent systems: Networks of plausible inference
    • (2nd print)
    • Pearl, J. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann, 1988,1991 (2nd print).
    • (1988) Morgan Kaufmann
    • Pearl, J.1
  • 14
    • 85029227062 scopus 로고    scopus 로고
    • Rice, J. Op. Cit. 342
    • Rice, J. Op. Cit. 342.
  • 17
    • 0345825896 scopus 로고    scopus 로고
    • Merriam-Webster
    • wwwebster Dictionary (1997, Merriam-Webster). http://www.m-w.com/cgi-bin/dictionary
    • (1997) Wwwebster Dictionary


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.