-
1
-
-
84868880295
-
CIA Confirms Cyber Attack Caused Multi-City Power Outage
-
SANS Institute
-
SANS Institute, "CIA Confirms Cyber Attack Caused Multi-City Power Outage," SANS NewsBites, vol. 10, no. 5, 2008; www.sans.org/ newsletters/newsbites/news bites.php?vol=108&issue=5.
-
(2008)
SANS NewsBites
, vol.10
, Issue.5
-
-
-
2
-
-
51849150631
-
The Crutial Reference Critical Information Infrastructure Architecture: A Blueprint
-
P. Veríssimo, N.F. Neves, and M. Correia, "The Crutial Reference Critical Information Infrastructure Architecture: A Blueprint," Int'l J. System of Systems Eng., vol. 1, nos. 1/2, 2008, pp. 78-95.
-
(2008)
Int'l J. System of Systems Eng
, vol.1
, Issue.1-2
, pp. 78-95
-
-
Veríssimo, P.1
Neves, N.F.2
Correia, M.3
-
3
-
-
58849113988
-
-
S.M. Bellovin, Distributed Firewalls, ;login:, Nov. 1999; www.usenix.org/publications/login/1999-11/ features/firewalls, html.
-
S.M. Bellovin, "Distributed Firewalls," ;login:, Nov. 1999; www.usenix.org/publications/login/1999-11/ features/firewalls, html.
-
-
-
-
4
-
-
46849103389
-
Access Control for Collaborative Systems: A Web Services Based Approach
-
A. Abou El Kalam et al., "Access Control for Collaborative Systems: A Web Services Based Approach," Proc. IEEE Int'l Conf. Web Services, 2007, pp. 1064-1071.
-
(2007)
Proc. IEEE Int'l Conf. Web Services
, pp. 1064-1071
-
-
Abou El Kalam, A.1
-
5
-
-
33747276448
-
Intrusion-Tolerant Middleware: The Road to Automatic Security
-
P. Veríssimo et al., "Intrusion-Tolerant Middleware: The Road to Automatic Security," IEEE Security & Privacy, vol. 4, no. 4, 2006, pp. 54-62.
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.4
, pp. 54-62
-
-
Veríssimo, P.1
-
6
-
-
27644448706
-
Implementing Trustworthy Services Using Replicated State Machines
-
F.B. Schneider and L. Zhou, "Implementing Trustworthy Services Using Replicated State Machines," IEEE Security & Privacy, vol. 3, no. 5, 2005, pp. 34-43.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.5
, pp. 34-43
-
-
Schneider, F.B.1
Zhou, L.2
-
7
-
-
0017943762
-
Operating Under Stress and Strain, IBBB
-
Mar
-
L.H. Fink and K. Carlsen, "Operating Under Stress and Strain," IBBB Spectrum, Mar. 1978, pp. 48-53.
-
(1978)
Spectrum
, pp. 48-53
-
-
Fink, L.H.1
Carlsen, K.2
-
8
-
-
27544466016
-
-
P. Sousa, N.F. Neves, and P. Veríssimo, How Resilient Are Distributed / Fault/Intrusion-Tolerant Systems? Proc. 35th IEEE/IFIP Int'l Conf. Dependable Systems and Networks, 2005, pp. 98-107.
-
P. Sousa, N.F. Neves, and P. Veríssimo, "How Resilient Are Distributed / Fault/Intrusion-Tolerant Systems?" Proc. 35th IEEE/IFIP Int'l Conf. Dependable Systems and Networks, 2005, pp. 98-107.
-
-
-
-
11
-
-
38949093199
-
Traveling through Wormholes: A New Look at Distributed Systems Models
-
P. Veríssimo. "Traveling through Wormholes: A New Look at Distributed Systems Models," ACM SIGACT News, vol. 37, no. 1, 2006.
-
(2006)
ACM SIGACT News
, vol.37
, Issue.1
-
-
Veríssimo, P.1
-
12
-
-
21644433634
-
-
P. Barham et al., Xen and the Art of Virtualization, Proc. 19th ACM Symp. Operating Systems Principles, 2003, pp. 164-177.
-
P. Barham et al., "Xen and the Art of Virtualization," Proc. 19th ACM Symp. Operating Systems Principles, 2003, pp. 164-177.
-
-
-
-
13
-
-
58849147768
-
-
Project Deliverable D2, Crutial European Commission project IST-2004-27513, Jan
-
F. Garrone et al., "Analysis of New Control Applications," Project Deliverable D2, Crutial European Commission project IST-2004-27513, Jan. 2007.
-
(2007)
Analysis of New Control Applications
-
-
Garrone, F.1
|