-
2
-
-
0027610755
-
The consensus problem in fault-tolerant computing
-
June
-
M. Barborak, M. Malek, and A. Dahbura, "The Consensus Problem in Fault-Tolerant Computing." ACM Computing Surveys, Vol. 25, No. 2, June 1993, pp. 171-220.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.2
, pp. 171-220
-
-
Barborak, M.1
Malek, M.2
Dahbura, A.3
-
4
-
-
0023294428
-
An intrusion-detection model
-
Feb.
-
D. Denning, "An Intrusion-Detection Model." IEEE Transactions on Software Engineering, Vol. SE-13, No. 2, Feb. 1987, pp. 222-232.
-
(1987)
IEEE Transactions on Software Engineering
, vol.SE-13
, Issue.2
, pp. 222-232
-
-
Denning, D.1
-
5
-
-
77950564085
-
Reducing the vulnerability of dynamic computer networks
-
University of Southern California, June
-
G. G. Finn, "Reducing the Vulnerability of Dynamic Computer Networks", ISI Research Report RR-88-201, University of Southern California, June 1988.
-
(1988)
ISI Research Report
-
-
Finn, G.G.1
-
6
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
March
-
K. Ilgun, R. A. Kemmerer, and P. A. Porras, "State Transition Analysis: A Rule-Based Intrusion Detection Approach." IEEE Transactions on Software Engineering, Vol. 21, No. 3, March 1995, pp. 181-199.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
8
-
-
0041296839
-
Integrating security in inter-domain routing protocols
-
Oct.
-
B. Kumar, and J. Crowcroft, "Integrating Security in Inter-domain Routing Protocols." Computer Communication Review, Oct. 1993, Vol. 23, No. 5, pp. 36-51.
-
(1993)
Computer Communication Review
, vol.23
, Issue.5
, pp. 36-51
-
-
Kumar, B.1
Crowcroft, J.2
-
9
-
-
0027609384
-
A survey of intrusion detection techniques
-
June
-
T. F. Lunt, "A Survey of Intrusion Detection Techniques." Computer and Security, June 1993, Vol. 12, No. 4, pp. 405-418.
-
(1993)
Computer and Security
, vol.12
, Issue.4
, pp. 405-418
-
-
Lunt, T.F.1
-
11
-
-
0019021284
-
The new routing algorithm for the arpanet
-
May
-
J. McQuillan, I. Richer, and E. Rosen, "The New Routing Algorithm for the ARPANET." IEEE Transactions on Communications, Vol. COM-28, No. 5, May 1980, pp. 711-719.
-
(1980)
IEEE Transactions on Communications
, vol.COM-28
, Issue.5
, pp. 711-719
-
-
McQuillan, J.1
Richer, I.2
Rosen, E.3
-
13
-
-
0003151687
-
Link-state routing
-
M. Steenstrup, ed., Prentice Hall
-
J. Moy, "Link-State Routing", in M. Steenstrup, ed., Routing in Communications Networks, Prentice Hall, 1995, pp. 135-157.
-
(1995)
Routing in Communications Networks
, pp. 135-157
-
-
Moy, J.1
-
15
-
-
0028430224
-
Network intrusion detection
-
May-June
-
B. Mukherjee, L. T. Heberlein, and K. N. Levitt, "Network Intrusion Detection. " IEEE Network, May-June 1994, Vol. 8, No. 3, pp. 26-41.
-
(1994)
IEEE Network
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
16
-
-
85034495108
-
Digital signature protection of the OSPF routing protocol
-
San Diego, California, February 22-23
-
S. L. Murphy, and M. R. Badger, "Digital Signature Protection of the OSPF Routing Protocol", Proceedings of the Symposium on Network and Distributed System Security (SNDSS'96), San Diego, California, February 22-23, 1996, pp. 93-102.
-
(1996)
Proceedings of the Symposium on Network and Distributed System Security (SNDSS'96)
, pp. 93-102
-
-
Murphy, S.L.1
Badger, M.R.2
-
19
-
-
84938017623
-
On the connection assignment problem of diagnosable systems
-
Dec.
-
F. P. Preparata, G. Metze, and R. T. Chien, "On the Connection Assignment Problem of Diagnosable Systems." IEEE Transactions on Electronic Computers, Vol. EC-16, No. 6, Dec. 1967, pp. 848-854.
-
(1967)
IEEE Transactions on Electronic Computers
, vol.EC-16
, Issue.6
, pp. 848-854
-
-
Preparata, F.P.1
Metze, G.2
Chien, R.T.3
|