1 "http://www.cert.org/stats"
2 Yongki Kim, "The design of adaptive intrusion tolerant system(ITS) based on historical data" 662-667, 2012
3 Yih Huang, "Self-Cleansing Systems for Intrusion Containment" 2002
4 Anantha K. Bangalore, "Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT)" 60-65, 2009
5 Quyen Nguyen, "Realizing S-Reliability for Services via Recovery-driven Intrusion Tolerance Mechanism" 176-181, 2010
6 Quyen Nguyen, "Quantitative Approach to Tuning of a Time-Based Intrusion-Tolerant System Architecture" 2009
7 P. Verissimo, "Intrusion-tolerant architectures: Concepts and design" 2677 : 3-36, 2003
8 PITAC, "Cyber Security: A Crisis of Prioritization" President's Information Technology Advisory Committee 2005
9 Yih Huang, "Closing Cluster Attack Windows Through Server Redundancy and Rotations" 12-21, 2006
10 H. Schwetman, "CSIM19: A Powerful Tool for Building System Models" 250-255, 2001
1 "http://www.cert.org/stats"
2 Yongki Kim, "The design of adaptive intrusion tolerant system(ITS) based on historical data" 662-667, 2012
3 Yih Huang, "Self-Cleansing Systems for Intrusion Containment" 2002
4 Anantha K. Bangalore, "Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT)" 60-65, 2009
5 Quyen Nguyen, "Realizing S-Reliability for Services via Recovery-driven Intrusion Tolerance Mechanism" 176-181, 2010
6 Quyen Nguyen, "Quantitative Approach to Tuning of a Time-Based Intrusion-Tolerant System Architecture" 2009
7 P. Verissimo, "Intrusion-tolerant architectures: Concepts and design" 2677 : 3-36, 2003
8 PITAC, "Cyber Security: A Crisis of Prioritization" President's Information Technology Advisory Committee 2005
9 Yih Huang, "Closing Cluster Attack Windows Through Server Redundancy and Rotations" 12-21, 2006
10 H. Schwetman, "CSIM19: A Powerful Tool for Building System Models" 250-255, 2001
11 Jungmin Lim, "A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology" SPRINGER 66 (66): 918-935, 2013