1 |
B. Madan, et al., 'Modeling and Quantification of Security Attributes of Software Systems,' International Conference on Dependable Systems and Networks, pp.505-514, June, 2002
DOI
|
2 |
Y. Liu and K. Trivedi, 'A general Framework for Network Survivability Quantification,' Proceedings of the 12th GI/ITG Conference on Measuring, Modelling and Evaluation of Computer and Communication Systems, pp.369-378, Sep., 2004
|
3 |
C. Cowan and Immunix Inc., 'Survivability: Synergizing Security and Reliability,' Sep., 2003
|
4 |
K. Trivedi, 'Probability and Statistics with Reliability Queueing and Computer Science Applications,' John Wiley & Sons, Inc., pp.472, 2002
|
5 |
C. Shelton, P. Koopman, and W. Nace, 'A Framework for Scalable Analysis and Design of System-Wide Graceful degradation in distributed Embedded Systems,' Eighth IEEE International Workshop on Object-oriented Real-time Dependable Systems, pp.156-163, Jan., 2003
|
6 |
J. Knight, et al, 'The Willow Architecture: Comprehensive Survivability for Large-Scale Distributed Applications,' submitted to: The International Conference on Dependable Systems and Networks, June, 2002
|
7 |
J. Knight, K. Strunk, and K. Sullivan, 'Towards a Rigorous Definition of Information System Survivability,' Pro- ceedings of the DARPA Information Conference and Exposition, pp.78-89, April, 2003
|
8 |
F. Wang, et aI., 'SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services,' Proceedings of the Foundations of Intrusion Tolerant Systems, pp.359-367, 2003
|
9 |
D. Wang, B. Madan, and K. Trivedi, 'Security Analysis of SITAR Intrusion Tolerance System,' Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems, pp.23-32, Oct., 2003
DOI
|
10 |
J. Reynolds, et al., 'On-line Intrusion Detection Attack Prevention Using Diversity Generate-and-Test, and Generali- zation,' Proceedings of the 36th Annual Hawaii International Conferences on System Sciences, pp.335-342, Jan., 2003
DOI
|
11 |
K. Goseva-Popstojanova, et al., 'Characterizing Intrusion Tolerant Systems using a State Transition Model,' DARFA Information Survivability Conference and exhibition, Vol.2, pp.211-221, June, 2001
DOI
|
12 |
R. Ellison, et al., 'Survivable Network Systems: An Emerging Discipline,' Proceedings of the 11th Canadian Information Technology Security Sysposium, May, 1999
|
13 |
V. Westmark, 'A Definition for Information System Survivability,' Proceedings of the 37th Annual Hawaii International Conferences on System Sciences, Vol.9, No.9, pp.90303a, Jan., 2004
DOI
|
14 |
P. Koopman, 'Elements of the Self-Healing System Problem Space,' Workshop on Architecting Dependable Systems, pp.31-36, May, 2003
|
15 |
D. Chess, C. Palmer, and S. White, 'Security in an Autonomic Computing Environment,' IBM Systems Journal, Vol.42, No.1, pp.107-118, 2003
DOI
|
16 |
F. Wang, R. Uppalli, and C. Killian, 'Analysis of Techniques for Building Intrusion Tolerant Server Systems,' Pro- ceedings of Military Communications Conference, pp.729-734, Oct., 2003
DOI
|
17 |
A. Avizienis, J. Laprie, and B. Randell, 'Fundamental concepts of dependability,' 3rd Information Survivability Workshop, pp.7-12, Oct., 2000
|