메뉴 건너뛰기




Volumn 2, Issue , 2001, Pages 119-125

Defense-enabled applications

Author keywords

[No Author keywords available]

Indexed keywords

MALICIOUS ATTACK;

EID: 84964556439     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DISCEX.2001.932164     Document Type: Conference Paper
Times cited : (14)

References (12)
  • 1
    • 0242444897 scopus 로고    scopus 로고
    • D. Bakken. Middleware. Washington State University. http://www.eecs.wsu.edu/~bakken/middleware-article-bakken.pdf.
    • Middleware
    • Bakken, D.1
  • 2
    • 0027610755 scopus 로고
    • The consensus problem in fault-tolerant computing
    • M. Barborak, A. Dahbura, and M. Malek. The consensus problem in fault-tolerant computing. ACM Comp. Surv., 25(2), 1993.
    • (1993) ACM Comp. Surv. , vol.25 , Issue.2
    • Barborak, M.1    Dahbura, A.2    Malek, M.3
  • 5
    • 0034588633 scopus 로고    scopus 로고
    • On the trail of intrusions into information systems
    • Dec
    • S. Kent. On the trail of intrusions into information systems. IEEE Spectrum, Dec. 2000.
    • (2000) IEEE Spectrum
    • Kent, S.1
  • 9
    • 0025564050 scopus 로고
    • Implementing fault-tolerant services using the state machine approach: A tutorial
    • F. Schneider. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Comp. Surv., 22(4), 1990.
    • (1990) ACM Comp. Surv. , vol.22 , Issue.4
    • Schneider, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.