메뉴 건너뛰기




Volumn 2, Issue , 2003, Pages 284-289

Engineering a distributed intrusion tolerant database system using COTS components

Author keywords

Computer crime; Data engineering; Data security; Database systems; Delay; Design engineering; Face detection; Intrusion detection; Prototypes; Transaction databases

Indexed keywords

COMPUTER CRIME; DAMAGE DETECTION; DATABASE SYSTEMS; FACE RECOGNITION; INTRUSION DETECTION; MERCURY (METAL); NETWORK SECURITY; REPAIR; SECURITY OF DATA; SOFTWARE PACKAGES;

EID: 84942430123     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DISCEX.2003.1194979     Document Type: Conference Paper
Times cited : (2)

References (9)
  • 5
    • 0034513874 scopus 로고    scopus 로고
    • Intrusion confinement by isolation in information systems
    • P. Liu, S. Jajodia, and C.D. McCollum. Intrusion confinement by isolation in information systems. Journal of Computer Security, 8(4):243-279, 2000.
    • (2000) Journal of Computer Security , vol.8 , Issue.4 , pp. 243-279
    • Liu, P.1    Jajodia, S.2    McCollum, C.D.3
  • 7
    • 0027609384 scopus 로고
    • A Survey of Intrusion Detection Techniques
    • June
    • T.F. Lunt. A Survey of Intrusion Detection Techniques. Computers & Security, 12(4):405-418, June 1993.
    • (1993) Computers & Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.