-
1
-
-
0034721164
-
Error and attack tolerance of complex networks
-
July
-
R. Albert, H. Jeong, and A.-L. Barabasi. Error and attack tolerance of complex networks. Nature, 406(6794):378-382, July 2000.
-
(2000)
Nature
, vol.406
, Issue.6794
, pp. 378-382
-
-
Albert, R.1
Jeong, H.2
Barabasi, A.-L.3
-
3
-
-
0025418952
-
Dependability modeling and evaluation of software fault-tolerant systems
-
J. Arlat, K. Kanoun, and J.-C. Laprie. Dependability modeling and evaluation of software fault-tolerant systems. IEEE Trans. Comput., 39(4):504-513, 1990.
-
(1990)
IEEE Trans. Comput.
, vol.39
, Issue.4
, pp. 504-513
-
-
Arlat, J.1
Kanoun, K.2
Laprie, J.-C.3
-
4
-
-
0035896667
-
Breakdown of the internet under intentional attack
-
Apr
-
R. Cohen, K. Erez, D. Ben-Avraham, and S. Havlin. Breakdown of the internet under intentional attack. Phys. Rev. Lett., 86(16):3682-3685, Apr 2001.
-
(2001)
Phys. Rev. Lett.
, vol.86
, Issue.16
, pp. 3682-3685
-
-
Cohen, R.1
Erez, K.2
Ben-Avraham, D.3
Havlin, S.4
-
5
-
-
33747061192
-
Fundamental differences in the reliability of n-modular redundancy and redundancy and n-version programming
-
D. E. Eckhardt and L. D. Lee. Fundamental differences in the reliability of n-modular redundancy and redundancy and n-version programming. J. Syst. Softw., 8(4):313-318, 1988.
-
(1988)
J. Syst. Softw.
, vol.8
, Issue.4
, pp. 313-318
-
-
Eckhardt, D.E.1
Lee, L.D.2
-
6
-
-
6444241717
-
Tolerance of scale-free networks: From friendly to intentional attack strategies
-
L. K. Gallos, P. Argyrakis, R. Cohen, and S. Havlin. Tolerance of scale-free networks: from friendly to intentional attack strategies. Physica A, 344:504-509, 2004.
-
(2004)
Physica A
, vol.344
, pp. 504-509
-
-
Gallos, L.K.1
Argyrakis, P.2
Cohen, R.3
Havlin, S.4
-
7
-
-
84955557456
-
Hiding routing information
-
London, UK, Springer-Verlag
-
D. M. Goldschlag, M. G. Reed, and P. F. Syverson. Hiding routing information. In Proceedings of the First International Workshop on Information Hiding, pages 137-150, London, UK, 1996. Springer-Verlag.
-
(1996)
Proceedings of the First International Workshop on Information Hiding
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
8
-
-
0035402083
-
Netcamo: Camouflaging network traffic for qos-guaranteed mission critical applications
-
Y. Guan, X. Fu, D. Xuan, P. U. Shenoy, R. Bettati, and W. Zhao. Netcamo: camouflaging network traffic for qos-guaranteed mission critical applications. In IEEE Transactions on Systems, Man, and Cybernetics, Part A, volume 31, pages 253-265, 2001.
-
(2001)
IEEE Transactions on Systems, Man, and Cybernetics, Part A
, vol.31
, pp. 253-265
-
-
Guan, Y.1
Fu, X.2
Xuan, D.3
Shenoy, P.U.4
Bettati, R.5
Zhao, W.6
-
9
-
-
43249094557
-
Protection vs. redundancy in homogeneous parallel systems
-
K. Hausken and G. Levitin. Protection vs. redundancy in homogeneous parallel systems. In Reliability Engineering & System Safety, volume 93, pages 1444-1451, 2008.
-
(2008)
Reliability Engineering & System Safety
, vol.93
, pp. 1444-1451
-
-
Hausken, K.1
Levitin, G.2
-
10
-
-
54049120572
-
False targets vs. redundancy in homogeneous parallel systems
-
K. Hausken and G. Levitin. False targets vs. redundancy in homogeneous parallel systems. In Reliability Engineering & System Safety, volume 94, pages 588-595, 2009.
-
(2009)
Reliability Engineering & System Safety
, vol.94
, pp. 588-595
-
-
Hausken, K.1
Levitin, G.2
-
13
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
J. C. Laprie and B. Randell. Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secur. Comput., 1(1):11-33, 2004.
-
(2004)
IEEE Trans. Dependable Secur. Comput.
, vol.1
, Issue.1
, pp. 11-33
-
-
Laprie, J.C.1
Randell, B.2
-
14
-
-
63149134856
-
Redundancy vs. protection vs. false targets for systems under attack
-
G. Levitin and K. Hausken. Redundancy vs. protection vs. false targets for systems under attack. In IEEE Transactions on Reliability, volume 58, pages 58-68, 2009.
-
(2009)
IEEE Transactions on Reliability
, vol.58
, pp. 58-68
-
-
Levitin, G.1
Hausken, K.2
-
15
-
-
38049039787
-
How to update dependable secure computing systems from a survivability assessment perspective?
-
B. Li, B. Saroj, and S. Musoke. How to update dependable secure computing systems from a survivability assessment perspective? In Proceedings of the Third IEEE International Symposium on Dependable, Autonomic and Secure Computing, pages 95-99, 2007.
-
(2007)
Proceedings of the Third IEEE International Symposium on Dependable, Autonomic and Secure Computing
, pp. 95-99
-
-
Li, B.1
Saroj, B.2
Musoke, S.3
-
16
-
-
63449141956
-
Typing communicating component assemblages
-
New York, NY, USA, ACM
-
M. Lienhardt, A. Schmitt, and J.-B. Stefani. Typing communicating component assemblages. In GPCE '08: Proceedings of the 7th international conference on Generative programming and component engineering, pages 125-136, New York, NY, USA, 2008. ACM.
-
(2008)
GPCE '08: Proceedings of the 7th International Conference on Generative Programming and Component Engineering
, pp. 125-136
-
-
Lienhardt, M.1
Schmitt, A.2
Stefani, J.-B.3
-
20
-
-
50249101303
-
Vulnerability of complex networks under intentional attack with incomplete information
-
J. Wu, H. Deng, Y. Tan, and D. Zhu. Vulnerability of complex networks under intentional attack with incomplete information. In Journal of Physics A: Mathematical and Theoretical, volume 40, pages 2665-2671, 2007.
-
(2007)
Journal of Physics A: Mathematical and Theoretical
, vol.40
, pp. 2665-2671
-
-
Wu, J.1
Deng, H.2
Tan, Y.3
Zhu, D.4
-
21
-
-
50949103905
-
On intentional attacks and protections in complex communication networks
-
S. Xiao and G. Xiao. On intentional attacks and protections in complex communication networks. Global Telecommunications Conference, pages 1-5, 2006.
-
(2006)
Global Telecommunications Conference
, pp. 1-5
-
-
Xiao, S.1
Xiao, G.2
-
22
-
-
0033282985
-
Preventing traffic analysis for real-time communication networks
-
D. Xuan, C. Li, D. Xuan, R. Bettati, and W. Zhao. Preventing traffic analysis for real-time communication networks. In Proceedings of The IEEE Military Communication Conference (MILCOM) '99, pages 744-750, 1999.
-
(1999)
Proceedings of the IEEE Military Communication Conference (MILCOM) '99
, pp. 744-750
-
-
Xuan, D.1
Li, C.2
Xuan, D.3
Bettati, R.4
Zhao, W.5
|