-
1
-
-
63749120191
-
Development of trustworthy network and facing scientific challenges
-
Lin Chuang, Wang Yuanzhuo, Tian Liqin. Development of trustworthy network and facing scientific challenges[J]. ZTE Communications, 2008, 14(1): 13-16.
-
(2008)
ZTE Communications
, vol.14
, Issue.1
, pp. 13-16
-
-
Lin, C.1
Wang, Y.2
Tian, L.3
-
2
-
-
20444411497
-
Research on trustworthy networks
-
Lin Chuang, Peng Xuehai. Research on trustworthy networks[J]. Chinese Journal of Computers, 2005, 28(5): 751-758.
-
(2005)
Chinese Journal of Computers
, vol.28
, Issue.5
, pp. 751-758
-
-
Lin, C.1
Peng, X.2
-
3
-
-
78650450765
-
-
Chinese source
-
2006.
-
(2006)
-
-
-
4
-
-
0003449736
-
Survivable network systems: An emerging discipline
-
CMU/SEI-97-TR-013, Carnegie Mellon University
-
Ellison R J, Fisher B D, Linger R, et al. Survivable network systems: An emerging discipline[R]. CMU/SEI-97-TR-013, Carnegie Mellon University, 1997.
-
(1997)
-
-
Ellison, R.J.1
Fisher, B.D.2
Linger, R.3
-
5
-
-
0032667966
-
Survivable network system analysis: A case study
-
Ellison R J, Linger R C, Longstaff T. Survivable network system analysis: A case study[J]. IEEE Software, 1999, 16(4): 70-77.
-
(1999)
IEEE Software
, vol.16
, Issue.4
, pp. 70-77
-
-
Ellison, R.J.1
Linger, R.C.2
Longstaff, T.3
-
6
-
-
0042457632
-
Survivable network analysis method
-
CMU/SEI-2000-TR-013, Carnegie Mellon University
-
Mead N R, Ellison R J, Linger R C. Survivable network analysis method[R]. CMU/SEI-2000-TR-013, Carnegie Mellon University, 2000.
-
(2000)
-
-
Mead, N.R.1
Ellison, R.J.2
Linger, R.C.3
-
8
-
-
0004266644
-
On the definition of survivability
-
CS-TR-33-00, Department of computer science, University of Virginia
-
Knight J C, Sullivan K J. On the definition of survivability[R]. CS-TR-33-00, Department of computer science, University of Virginia, 2000.
-
(2000)
-
-
Knight, J.C.1
Sullivan, K.J.2
-
9
-
-
78650499946
-
A diversified redundancy method exploiting the intrusion tolerance
-
Third Information Survivability Workshop(ISW-2000)
-
Huang Zunguo, Lu Xicheng, Wang H. A diversified redundancy method exploiting the intrusion tolerance[C]. Third Information Survivability Workshop(ISW-2000), 2000.
-
(2000)
-
-
Huang, Z.1
Lu, X.2
Wang, H.3
-
10
-
-
33646758793
-
Quantifying survivability of services in distributed system
-
Guo Yuanbo, Ma Jianfeng. Quantifying survivability of services in distributed system[J]. Journal of Tongji University: Natural Science, 2002, 30(10): 1190-1193.
-
(2002)
Journal of Tongji University: Natural Science
, vol.30
, Issue.10
, pp. 1190-1193
-
-
Guo, Y.1
Ma, J.2
-
11
-
-
33646836832
-
Two survivability quantitative analysis methods for network security management systems
-
Bao Xiuguo, Hu Mingzeng, Zhang Shaorui, et al. Two survivability quantitative analysis methods for network security management systems[J]. Journal of China Institute of Communications, 2004, 25(9): 34-41.
-
(2004)
Journal of China Institute of Communications
, vol.25
, Issue.9
, pp. 34-41
-
-
Bao, X.1
Hu, M.2
Zhang, S.3
-
12
-
-
78650454299
-
Theory and key technology research on survivable network system
-
Xi'an: Xidian University
-
Wang Chao. Theory and key technology research on survivable network system[D]. Xi'an: Xidian University, 2006.
-
(2006)
-
-
Wang, C.1
-
13
-
-
78650507008
-
-
Chinese source
-
2005.
-
(2005)
-
-
-
14
-
-
78650448520
-
Research on formal description techniques of network attack procedures
-
Shi Zhicai, Chen Chao, Peng Dan, et al. Research on formal description techniques of network attack procedures[J]. Application Research of Computers, 2007(05): 150-152.
-
(2007)
Application Research of Computers
, Issue.5
, pp. 150-152
-
-
Shi, Z.1
Chen, C.2
Peng, D.3
|