1 |
H. F. Lipson, D. A. Fisher, 'Survivability - A New Technical and Business Perspective on Security,' Proceedings of the 1999 New Security Paradigms Workshop. Caledon Hill, ON, September 21-24, 1999. New York, NY: Association for Computer Machinery, 2000
DOI
|
2 |
S. Jha and J. M. Wing., 'Survivability Analysis of Networked Systems,' Proceedings of the 23rd International Conference on Software Engineering (ICSE2000), pages 307-317, 2001
|
3 |
R. C. Linger, A. P. Moore, 'Foundations for Survivable System Development: Service Traces, Intrusion Traces, and Evaluation Models,' Technical Report CMU/SEI-20001-TR-029, Carnegie Mellon University, Pittsburgh, PA 15213,October 2001
|
4 |
Jaynarayan H. Lala, 'Information Assurance and Survivability,' International Conference on Dependable Systems and Networks, NY, USA, June 25-28, 2000
|
5 |
Dale M. Johnson and Ph.D.Doug Williams, Ph.D., 'Organically Assured and Survivable Information Systems (OASIS),' MITRE Technology Symposium, Washington, June 2002
|
6 |
R. J. Ellison and D. A. Fisher and R. C. Linger and H. F. Lipson and T. Longstaff and N. R. Mead, 'Survivable Network Systems: An Emer-ging Discipline,' CERT, November 1997 Revised: May 1999, CMU/SEI-97-TR-013
|
7 |
Richard C. Linger and Andrew P. Moore, 'Foundations for Survivable System Development: Service Traces, Intrusion Traces, and Evaluation Models,' CERT, CMU/SEI-2001-TR-029, October 2001
|
8 |
M. Bishop: Vulnerabilities Analysis. Proceedings of the Recent Advances in Intrusion Detection, (1999)
|
9 |
R. Ellison, D. Fisher, R. Linger, H. Lipson, T. Longstaff, and N. Mead, 'Survivable network systems: An emerging discipline,' Technical Report CMU/SEI-97-153, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA 15213, November 1997
|
10 |
D. A. Fisher and H.F. Lipson, 'Emergent Algorithms - A New Method for Enhancing Survivability in Unbounded Systems,' Proceedings of the 32nd Annual Hawaii International Conference on System Sciences, Maui, Hawaii, January 5-8, 1999 (HICSS-32), IEEE Computer Society, 1999
DOI
|
11 |
J. H. Lala, 'Introduction,' Proceeding of the Foundation of Intrusion Tolerant System (OASIS'03), IEEE Computer Society, 2003
|
12 |
Eun-Jung Choi, Hyung-Jong Kim, Myuhng-Joo Kim, 'DMKB : A Defense Mechanism Knowledge Base,' International Conference ICCSA, May 2004, Assisi Italy, LNCS 3043 2004
DOI
|