共 8 条
[1]
CharacterizingIntrusionTolerantSystemsUsingAStateTransitionModel. http://www.anr.mcnc.org/projects/SITAR/papers/darpa00.pdf . 2000
[2]
FaultTolerance:PrinciplesandPractice. LeeP .A,AndersonT. . 1990
[3]
Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response. Amoroso E. G. . 1999
[4]
Bugtraq1600. http://www.securityfocus.com/bid/1600 . 2000
[5]
Computervulnerabilityanalysis. KrsulI,SpaffordE .H,TripunitaraM .V. DepartmentofComputerScience,PurdueUniversity,TechnicalReportCoastTR 9807 . 1998
[6]
Sitar:Ascalableintrusiontolerantarchitecturefordistributedservices. MCNCandDUniversity. TechnicalReport,ResearchProposaltoDARPABAA 0015 . 2000
[7]
Vulnerabilitytestingofsoftwaresystemusingfaultinjection. DuW,MathurA .P. DepartmentofComputerScience,PurdueUniversity:TechnicalReportCoastTR 9802 . 1998
[8]
NetworkIntrusionDetection:AnAnalysts’’Handbook. NorthcuttS,NovakJ. . 2000