References
- F. Wang, R. Uppalli, and C. Killian, 'Analysis of Techniques for Building Intrusion Tolerant Server Systems,' Proceedings of Military Communications Conference, pp.729-734, Oct., 2003 https://doi.org/10.1109/MILCOM.2003.1290202
- A. Avizienis, J. Laprie, B. Randell, 'Fundamental concepts of dependability,' 3rd Information Survivability Workshop, pp. 7-12. Oct. 2000
- P. Koopman, 'Elements of the Self-Healing System Problem Space,' Workshop on Architecting Dependable Systems, pp. 31-36, May 2003
- D. Chess, C. Palmer, and S. White, 'Security in an Autonomic Computing Environment,' IBM Systems Journal, Vol. 42, No.1, pp. 107-118, 2003 https://doi.org/10.1147/sj.421.0107
- http://www.laas.research.ec.org/maftia/
- J. Reynolds, et al., 'On-line Intrusion Detection Attack Prevention Using Diversity Generate-and-Test, and Generalization,' Proceedings of the 36th Annual Hawaii International Conferences on System Sciences, pp.335-342, Jan., 2003 https://doi.org/10.1109/HICSS.2003.1174911
- F. Wang, et. al., 'SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services,' Proceedings of the Foundations of Intrusion Tolerant Systems, pp. 359-367, 2003 https://doi.org/10.1109/FITS.2003.1264942
- F. Wang and C. Killian, 'Design and Implementation of SITAR Architecture : A Status Report,' Proceedings of Intrusion Tolerant System Workshop, C-3-1, Supplemental Volume on International Conference on Dependable System & Networks, June 2002
- T. Courtney, et. al., 'Providing Intrusion Tolerance with ITUA.' Proceedings of the International Conference on Dependable Systems & Networks, pp. C-5-1 - C-5-3, June 2002
- P. Luenam and P. Liu, 'The Design of an Adaptive Intrusion Tolerant Database System,' Proceedings of IEEE Workshop on Intrusion Tolerant Systems, pp. C-2-1 - C-2-8, June 2002 https://doi.org/10.1109/FITS.2003.1264925
- J. Knight, et. al., 'The Willow Architecture: Comprehensive Survivability for Large-Scale Distributed Applications,' Technical Report CU-CS926-01, Department of Computer Science, University of Colorado, December, 2001
- K. Goseva-Popstojanova, et. al., 'Characterizing Intrusion Tolerant Systems using a State Transition Model,' DARFA Information Survivability Conference and exhibition, Vol. 2, pp. 211-221, June 2001 https://doi.org/10.1109/DISCEX.2001.932173
- D. Wang, B. Madan, and K. Trivedi, 'Security Analysis of SIT AH Intrusion Tolerance System,' Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems, pp, 23- 32, Oct. 2003
- G. Kim, M. Choi, and K. Lee, 'Classification of the Intrusion Tolerant Systems and Integrated Framework for Survivability Enhancement,' The Korea Information Processing Society Transactions, Vol. 10C, No.3, pp.295-304, 2003 https://doi.org/10.3745/KIPSTC.2003.10C.3.295
- C. Shelton, P. Koopman, and W. Nace, 'A Framework for Scalable Analysis and Design of System-Wide Graceful degradation in distributed Embedded Systems.' Eighth IEEE International Workshop on Object-oriented Real-time Dependable Systems, pp.156-163, Jan. 2003
- O. Raz, P. Koopman, and M. Shaw, 'Enabling Automatic Adaptation in Systems with Under-Specified Elements,' 1st Workshop on Self-Healing Systems, pp. 55-60, Nov. 2002
- J. Kephart, and D. Chess, 'The Vision of Autonomic Computing,' IEEE Computer, Vol. 36, No. 2. pp, 41-50. 2003 https://doi.org/10.1109/MC.2003.1160055
- L. Kleinrock, Queueing Systems: Volume 1 Theory, John Wiley & Sons, pp. 417, 1975
- K. Trivedi, Probability and Statistics with Reliability Queueing and Computer Science Applications, John Wiley & Sons, Inc., pp. 472, 2002
- B. Madan, et al., 'Modeling and Quantification of Security Attributes of Software Systems,' Proceedings of the International Conference on Dependable Systems and Networks, pp.505-514, June, 2002 https://doi.org/10.1109/DSN.2002.1028941