Computer Science ›› 2014, Vol. 41 ›› Issue (4): 65-69.
Previous Articles Next Articles
SU Yan,ZHAO Guo-sheng,WANG Jian,ZHANG Nan and LI Lin
[1] Westmark V R.A Definition for Information System Survivabi-lity[C]∥Proceedings of the 37th Hawaii Internal Conference on System Sciences,Track 9.Washington,IEEE Computer Society Press,2004:2086-2096 [2] Ellison R J,Fisher D A,Linger R C,et al.Survivable network systems:An emerging discipline[R].CMU/SEI,Technical Report,CMU/SEI-97-TR-013.1997 [3] Ellison R J,Moore A P.Trustworthy refinement through intru-sion-aware design (TRIAD):An Overview[C]∥Proceedings of the 3rd Annual High Confidence Software and Systems Confe-rence.Baltimore,MD,2003:1-10 [4] Richard C L,Howard F L,John M,et al.Life-cycle models for survivable systems[R].CMU/SEI-2002-ESC-TR-026.Boston:Carnegie Mellon University,2002 [5] 赵国生,王慧强,王健.一种基于灰色关联分析的网络可生存性态势评估方法[J].小型微型计算机系统,2006,7(10):1861-1864 [6] 王健,王慧强,赵国生.基于序列蒙特卡罗的网络生存态势跟踪评估[J].哈尔滨工业大学学报,2008,0(5):802-806 [7] Wang J,Wang H Q,Zhao G S.A situation assessment method for network survivability[J]. Journal of Wuhan University:Na-tural Sciences,2006,1(6):1785-1788 [8] Wang J,Wang H Q,Zhao G S.Formal modeling and quantitative evaluation for information system survivability based on PEPA[J].The Journal of China Universities of Posts and Telecommunications,2008,15(2):88-96 [9] 王健,王慧强,赵国生.分布式任务关键系统生存性自动分析与验证[J].高技术通讯,2009,19(6):572-579 [10] Zhao G S,Wang H Q,Wang J.A novel formal analysis method of network survivability based on stochastic process algebra[J].Tsinghua Science & Technology,2007,12(1):175-179 [11] Zinky J A,Bakken D E,Schantz R.Architectural support for quality of service for CORBA objects[J].Theory and Practice of Object Systems,1997,3(1):55-73 [12] Matti A H,Richard D S,Carlos A U,et al.Survivability through customization and adaptability:The cactus approach[C]∥DARPA Information Survivability Conference and Exposition (DISCEX 2000).Hilton Head,SC,USA,2000:294-307 [13] Xie W,Hong Y,Trivedi K.Analysis of a two-level software rejuvenation policy[J].Reliability Engineering and System Safety,2005,7(1):13-22 [14] Patterson D,Brown A,Broadwell P,et al.Recovery-orientedcomputing (ROC):Motivation,definition,techniques,and case studies[R].Technical Report UCB//CSD-02-1175.UC Berkeley Computer Science,2002 [15] 赵国生.任务关键系统生存性应急增强技术研究[D].哈尔滨:哈尔滨工程大学,2009 [16] Xie Y,Yu S Z.A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors[J].Networking,IEEE/ACM Transactions on,2009,17(1):54-65 [17] Beitollahi H,Deconinck G.ConnectionScore:A Statistical Technique to Resist Application-layer DDoS Attacks[R].Tech.Rep.01-2012-0130.Electrical Engineering Department,University of Leuven,Belgium |
No related articles found! |
|