-
1
-
-
51449101349
-
Getting a grip on the grid
-
Madani, V., Novosel, D.: Getting a grip on the grid. Spectrum, IEEE 42 (2005) 42-47.
-
(2005)
Spectrum
, vol.IEEE 42
, pp. 42-47
-
-
Madani, V.1
Novosel, D.2
-
2
-
-
84872800478
-
SKMA: A key management architecture for SCADA systems
-
Australia, Australian Computer Society, Inc
-
Dawson, R., Boyd, C, Dawson, E., Gonzalez Nieto, J.: SKMA: a key management architecture for SCADA systems. In: ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research, Darlinghurst, Australia, Australian Computer Society, Inc. (2006) 183-192.
-
(2006)
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research, Darlinghurst
, pp. 183-192
-
-
Dawson, R.1
Boyd, C.2
Dawson, E.3
Gonzalez Nieto, J.4
-
3
-
-
63349086005
-
-
Wilson, C: Terrorist capabilities for cyber-attack. In: Dunn and V. Mauer, editors, Int. CIIP Handbook II, CSS, ETH Zurich (2006) 69-88.
-
Wilson, C: Terrorist capabilities for cyber-attack. In: Dunn and V. Mauer, editors, Int. CIIP Handbook volume II, CSS, ETH Zurich (2006) 69-88.
-
-
-
-
4
-
-
84881247246
-
Intrusion-Tolerant Architectures: Concepts and Design
-
R. Lemos, C. Gacek, & A. Romanovsky, editors, Architecting Dependable Systems, of
-
Verissimo, P., Neves, N. F., Correia, M.: Intrusion-Tolerant Architectures: Concepts and Design. In: R. Lemos, C. Gacek, & A. Romanovsky, editors, Architecting Dependable Systems, vol. 2677 of Lecture Notes in Computer Science, pp.3-36, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2677
, pp. 3-36
-
-
Verissimo, P.1
Neves, N.F.2
Correia, M.3
-
5
-
-
51849150631
-
The CRUTIAL reference critical information infrastructure architecture: A blueprint
-
Verissimo, P., Neves, N. F., Correia, M.: The CRUTIAL reference critical information infrastructure architecture: a blueprint. In: International Journal of System of Systems Engineering, vol. 1, n. 1/2, pp 78-95, 2008.
-
(2008)
International Journal of System of Systems Engineering
, vol.1
, Issue.1-2
, pp. 78-95
-
-
Verissimo, P.1
Neves, N.F.2
Correia, M.3
-
6
-
-
63349094550
-
Intrusion-Tolerant Protection for Critical Infrastructures
-
Technical Report DI/FCUL TR-07-8
-
Bessani, A. N., Sousa, P., Correia, M., Neves, N. F., Verissimo, P.: Intrusion-Tolerant Protection for Critical Infrastructures. Technical Report DI/FCUL TR-07-8, 2007.
-
(2007)
-
-
Bessani, A.N.1
Sousa, P.2
Correia, M.3
Neves, N.F.4
Verissimo, P.5
-
7
-
-
50049123013
-
Resilient Intrusion Tolerance through Proactive and Reactive Recovery
-
Sousa, P., Bessani, A. N., Correia, M., Neves, N. F., Verissimo, P.: Resilient Intrusion Tolerance through Proactive and Reactive Recovery. In: Proceedings of the 13th IEEE Pacific Rim Dependable Computing Conference, pages 373-380, 2007.
-
(2007)
Proceedings of the 13th IEEE Pacific Rim Dependable Computing Conference
, pp. 373-380
-
-
Sousa, P.1
Bessani, A.N.2
Correia, M.3
Neves, N.F.4
Verissimo, P.5
-
8
-
-
38949093199
-
Travelling through wormholes: A new look at distributed systems models
-
Verissimo, P.: Travelling through wormholes: a new look at distributed systems models. SIGACT News 37 (2006) 66-81.
-
(2006)
SIGACT News
-
-
Verissimo, P.1
-
9
-
-
51849107351
-
Analysis of a Redundant Architecture for Critical Infrastructure Protection
-
R. Lemos, F. Di Giandomenico, C. Gacek, H. Muccini & M. Vieira, editors, Architecting Dependable Systems, of
-
Daidone, A., Chiaradonna, S., Bondavalli, A., Verissimo, P.: Analysis of a Redundant Architecture for Critical Infrastructure Protection. In: R. Lemos, F. Di Giandomenico, C. Gacek, H. Muccini & M. Vieira, editors, Architecting Dependable Systems, vol. 5135 of Lecture Notes in Computer Science, pp.78-100, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5135
, pp. 78-100
-
-
Daidone, A.1
Chiaradonna, S.2
Bondavalli, A.3
Verissimo, P.4
-
10
-
-
33845597598
-
Using Attack Injection to Discover New Vulnerabilities
-
Neves, N. F., Antunes, J., Correia, M., Verissimo, P., Neves, R.: Using Attack Injection to Discover New Vulnerabilities. In: Proceedings of the International Conference on Dependable Systems and Networks (DSN), pages 457-466, 2006.
-
(2006)
Proceedings of the International Conference on Dependable Systems and Networks (DSN)
, pp. 457-466
-
-
Neves, N.F.1
Antunes, J.2
Correia, M.3
Verissimo, P.4
Neves, R.5
-
11
-
-
0036821893
-
The Mobius framework and its implementation
-
Deavours, D. D., Clark, G., Courtney, T., Daly, D., Derisavi, S., Doyle, J. M., Sanders, W. H., Webster, P. G.: The Mobius framework and its implementation. In: IEEE Transactions on Software Engineering, 28(10):956-969, 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.10
, pp. 956-969
-
-
Deavours, D.D.1
Clark, G.2
Courtney, T.3
Daly, D.4
Derisavi, S.5
Doyle, J.M.6
Sanders, W.H.7
Webster, P.G.8
|