-
1
-
-
0033299558
-
Simulating cyber attacks, defenses, and consequences
-
IFIP TC-11
-
Cohen, F.: Simulating Cyber Attacks, Defenses, and Consequences. IFIP TC-11. Computers and Security. 1999.: http://all.net/journal/ntb/simulate/ simulate.html
-
(1999)
Computers and Security
-
-
Cohen, F.1
-
2
-
-
0141910763
-
A simulation model for managing survivability of networked information systems
-
CMU/SEI-2000-TR-020
-
Moitra S. D., Konda S. L.: A Simulation Model for Managing Survivability of Networked Information Systems. Networked survivable systems. CMU/SEI-2000-TR-020 (2000) 47 p
-
(2000)
Networked Survivable Systems
-
-
Moitra, S.D.1
Konda, S.L.2
-
4
-
-
84941166362
-
-
Gupta, V., Lam, V., Ramasamy, H.V., Sanders, W. H., Singh, S.: Stochastic Modeling of Intrusion-Tolerant Server Architectures for Dependability and Performance Evaluation (2003) 86 p
-
(2003)
Stochastic Modeling of Intrusion-tolerant Server Architectures for Dependability and Performance Evaluation
-
-
Gupta, V.1
Lam, V.2
Ramasamy, H.V.3
Sanders, W.H.4
Singh, S.5
-
5
-
-
84941176467
-
-
Formal methods Europe.: http://www.fmeurope.org/
-
-
-
-
6
-
-
84941167154
-
-
Virtual library: formal methods.: http://vl.fmnet.info/
-
-
-
-
7
-
-
84941179430
-
-
Simulaworks
-
Simulaworks.: http://mathtools.softlock.net/
-
-
-
-
8
-
-
84941189006
-
-
TimeNET
-
TimeNET.: http://pdv.cs.tu-berlin.de/~timenet/
-
-
-
-
9
-
-
84941191647
-
Möbius: Model-based environment for validation of system reliability, availability, security, and performance
-
Sanders, W. H.-. Möbius: Model-Based Environment for Validation of System Reliability, Availability, Security, and Performance. User Manual. Version 1.8.0 (2005) 212 p
-
(2005)
User Manual. Version 1.8.0
-
-
Sanders, W.H.1
-
11
-
-
84944319215
-
Stochastic activity networks: Formal definitions and concepts
-
Springer, Berlin
-
Sanders W. H., Meyer, J. F.: Stochastic Activity Networks: Formal Definitions and Concepts. Lecture Notes in Computer Science, no. 2090, Springer, Berlin (2001) 315-343
-
(2001)
Lecture Notes in Computer Science
, vol.2090
, pp. 315-343
-
-
Sanders, W.H.1
Meyer, J.F.2
-
14
-
-
16244368460
-
Model-based validation of an intrusion-tolerant information system
-
Stevens, F., Courtney, T., Singh, S., Agbaria, A., Meyer, J.F., Sanders, W.H., Pal, P.: Model-Based Validation of an Intrusion-Tolerant Information System. Proc. 23rd Symp. Reliable Distributed Systems (2004) 11 p
-
(2004)
Proc. 23rd Symp. Reliable Distributed Systems
-
-
Stevens, F.1
Courtney, T.2
Singh, S.3
Agbaria, A.4
Meyer, J.F.5
Sanders, W.H.6
Pal, P.7
-
15
-
-
0000086137
-
A unified approach for specifying measures of Performance, dependability, and performability
-
Dependable Computing for Critical Applications Springer-Verlag
-
Sanders, W. H., Meyer, J. F.: A unified approach for specifying measures of Performance, dependability, and performability. Dependable Computing for Critical Applications, Vol 4: of Dependable Computing and Fault-Tolerant Systems. Springer-Verlag (1991) 215-237
-
(1991)
Dependable Computing and Fault-tolerant Systems
, vol.4
, pp. 215-237
-
-
Sanders, W.H.1
Meyer, J.F.2
-
17
-
-
0003531721
-
-
PhD thesis, Carnegie Mellon University, Department of Engineering and Public Policy
-
Howard, J. D.: An analysis of security incidents on the Internet, 1989-1995. PhD thesis, Carnegie Mellon University, Department of Engineering and Public Policy, (1997).: http://www.cert.org/research/JHThesis/ table_of_contents.html
-
(1997)
An Analysis of Security Incidents on the Internet, 1989-1995
-
-
Howard, J.D.1
-
18
-
-
33750982987
-
Computer system attack classification
-
Technology, Kaunas
-
N. Paulauskas, E. Garsva. Computer System Attack Classification. Electronics and Electrical Engineering, No. 2(66). Technology, Kaunas (2006) 84-87
-
(2006)
Electronics and Electrical Engineering
, vol.2
, Issue.66
, pp. 84-87
-
-
Paulauskas, N.1
Garsva, E.2
|