共 14 条
[1]
Software Tamper Resistance: Obstructing Static Analysis of Programs. Wang C X,Hill J,Knight J,et al. Technical Report CS-2000-12, University of Virginia . 2000
[2]
Survivable Network Analysis Method. Mead N,Ellison R,Richard C,et al. Technical Report,CMU/SEI-2000-TR-013 . 2000
[3]
Survivable Network Systems: An Emerging Discipline. Ellison R,Fisher D,Linger R,et al. Technical Report, CMU/SEI-97-TR-013 . 1997
[4]
A Diversified Dynamic Redundancy Method Exploiting the Intrusion Tolerance. Huang Zunguo,Lu Xicheng,Wang Huaimin. Information Survivability Workshop . 2000
[5]
Trustworthy refinement through intrusion-aware design:An overview. Ellison R.J,Moore A.P. Proceedings of the 3rd Annual High Confidence Software and Systems Conference . 2003
[6]
Survivable network system analysis:A case study. Ellison R J,,Linger R C,Longstaff T. IEEE Software . 1999
[7]
不确定性人工智能[M]. 国防工业出版社 , 李德毅,杜鹢著, 2005
[8]
可信计算系统设计和分析[M]. 清华大学出版社 , 徐拾义, 2006
[9]
可生存网络系统的理论与关键技术研究[D]. 王超.西安电子科技大学 2006