Research and implement on the intrusion tolerant system
Intrusion tolerance technologies guarantee systems provided essential services by the fullest extent when some intrusions sneak into them.Architecture of an intrusion-tolerant system was proposed and intrusion tolerance technologies in node-level and system-level were practiced.Online intrusion diag...
Saved in:
Main Authors: | YIN Li-hua, HE Song |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2006-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74665489/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Design and implementation of an intrusion-tolerant application server middleware
by: GUO Yuan-bo, et al.
Published: (2009-01-01) -
Fuzzy trust model for wireless sensor networks with intrusion tolerance
by: WANG Liang-min1, et al.
Published: (2010-01-01) -
Decision-level fusion model of multi-source intrusion detection alerts
by: LI Zhi-dong, et al.
Published: (2011-01-01) -
New approach to evaluate the capacity of signature-based intrusion detection systems
by: SUN Mei-feng1, et al.
Published: (2007-01-01) -
Comparison of Intrusive Effects and Amount of Root Resorption in Maxillary Incisors Using Two Conventional Intrusion Arches and Mini-Implants
by: Shilpa Vinu, et al.
Published: (2024-12-01)