메뉴 건너뛰기




Volumn 42, Issue 6, 2010, Pages 99-104

Study on the network system status's assessment and forecast model based on cloud model

Author keywords

Cloud model; Deterministic finite automaton (DFA); Forecast model; Network system; State assessment

Indexed keywords

CLOUD MODELS; DETERMINISTIC FINITE AUTOMATA; FORECAST MODEL; NETWORK SYSTEMS; STATE ASSESSMENT;

EID: 78650430562     PISSN: 10093087     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (7)

References (14)
  • 1
    • 63749120191 scopus 로고    scopus 로고
    • Development of trustworthy network and facing scientific challenges
    • Lin Chuang, Wang Yuanzhuo, Tian Liqin. Development of trustworthy network and facing scientific challenges[J]. ZTE Communications, 2008, 14(1): 13-16.
    • (2008) ZTE Communications , vol.14 , Issue.1 , pp. 13-16
    • Lin, C.1    Wang, Y.2    Tian, L.3
  • 2
    • 20444411497 scopus 로고    scopus 로고
    • Research on trustworthy networks
    • Lin Chuang, Peng Xuehai. Research on trustworthy networks[J]. Chinese Journal of Computers, 2005, 28(5): 751-758.
    • (2005) Chinese Journal of Computers , vol.28 , Issue.5 , pp. 751-758
    • Lin, C.1    Peng, X.2
  • 3
    • 78650450765 scopus 로고    scopus 로고
    • Chinese source
    • 2006.
    • (2006)
  • 4
    • 0003449736 scopus 로고    scopus 로고
    • Survivable network systems: An emerging discipline
    • CMU/SEI-97-TR-013, Carnegie Mellon University
    • Ellison R J, Fisher B D, Linger R, et al. Survivable network systems: An emerging discipline[R]. CMU/SEI-97-TR-013, Carnegie Mellon University, 1997.
    • (1997)
    • Ellison, R.J.1    Fisher, B.D.2    Linger, R.3
  • 5
    • 0032667966 scopus 로고    scopus 로고
    • Survivable network system analysis: A case study
    • Ellison R J, Linger R C, Longstaff T. Survivable network system analysis: A case study[J]. IEEE Software, 1999, 16(4): 70-77.
    • (1999) IEEE Software , vol.16 , Issue.4 , pp. 70-77
    • Ellison, R.J.1    Linger, R.C.2    Longstaff, T.3
  • 6
    • 0042457632 scopus 로고    scopus 로고
    • Survivable network analysis method
    • CMU/SEI-2000-TR-013, Carnegie Mellon University
    • Mead N R, Ellison R J, Linger R C. Survivable network analysis method[R]. CMU/SEI-2000-TR-013, Carnegie Mellon University, 2000.
    • (2000)
    • Mead, N.R.1    Ellison, R.J.2    Linger, R.C.3
  • 8
    • 0004266644 scopus 로고    scopus 로고
    • On the definition of survivability
    • CS-TR-33-00, Department of computer science, University of Virginia
    • Knight J C, Sullivan K J. On the definition of survivability[R]. CS-TR-33-00, Department of computer science, University of Virginia, 2000.
    • (2000)
    • Knight, J.C.1    Sullivan, K.J.2
  • 9
    • 78650499946 scopus 로고    scopus 로고
    • A diversified redundancy method exploiting the intrusion tolerance
    • Third Information Survivability Workshop(ISW-2000)
    • Huang Zunguo, Lu Xicheng, Wang H. A diversified redundancy method exploiting the intrusion tolerance[C]. Third Information Survivability Workshop(ISW-2000), 2000.
    • (2000)
    • Huang, Z.1    Lu, X.2    Wang, H.3
  • 10
    • 33646758793 scopus 로고    scopus 로고
    • Quantifying survivability of services in distributed system
    • Guo Yuanbo, Ma Jianfeng. Quantifying survivability of services in distributed system[J]. Journal of Tongji University: Natural Science, 2002, 30(10): 1190-1193.
    • (2002) Journal of Tongji University: Natural Science , vol.30 , Issue.10 , pp. 1190-1193
    • Guo, Y.1    Ma, J.2
  • 11
    • 33646836832 scopus 로고    scopus 로고
    • Two survivability quantitative analysis methods for network security management systems
    • Bao Xiuguo, Hu Mingzeng, Zhang Shaorui, et al. Two survivability quantitative analysis methods for network security management systems[J]. Journal of China Institute of Communications, 2004, 25(9): 34-41.
    • (2004) Journal of China Institute of Communications , vol.25 , Issue.9 , pp. 34-41
    • Bao, X.1    Hu, M.2    Zhang, S.3
  • 12
    • 78650454299 scopus 로고    scopus 로고
    • Theory and key technology research on survivable network system
    • Xi'an: Xidian University
    • Wang Chao. Theory and key technology research on survivable network system[D]. Xi'an: Xidian University, 2006.
    • (2006)
    • Wang, C.1
  • 13
    • 78650507008 scopus 로고    scopus 로고
    • Chinese source
    • 2005.
    • (2005)
  • 14
    • 78650448520 scopus 로고    scopus 로고
    • Research on formal description techniques of network attack procedures
    • Shi Zhicai, Chen Chao, Peng Dan, et al. Research on formal description techniques of network attack procedures[J]. Application Research of Computers, 2007(05): 150-152.
    • (2007) Application Research of Computers , Issue.5 , pp. 150-152
    • Shi, Z.1    Chen, C.2    Peng, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.