[RDF data]
Home | Example Publications
PropertyValue
dcterms:bibliographicCitation <http://dblp.uni-trier.de/rec/bibtex/journals/ieeesp/NguyenS11>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Arun_Sood>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Quyen_L._Nguyen>
foaf:homepage <http://dx.doi.org/doi.org%2F10.1109%2FMSP.2010.145>
foaf:homepage <https://doi.org/10.1109/MSP.2010.145>
dc:identifier DBLP journals/ieeesp/NguyenS11 (xsd:string)
dc:identifier DOI doi.org%2F10.1109%2FMSP.2010.145 (xsd:string)
dcterms:issued 2011 (xsd:gYear)
swrc:journal <https://dblp.l3s.de/d2r/resource/journals/ieeesp>
rdfs:label A Comparison of Intrusion-Tolerant System Architectures. (xsd:string)
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Arun_Sood>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Quyen_L._Nguyen>
swrc:number 4 (xsd:string)
swrc:pages 24-31 (xsd:string)
owl:sameAs <http://bibsonomy.org/uri/bibtexkey/journals/ieeesp/NguyenS11/dblp>
owl:sameAs <http://dblp.rkbexplorer.com/id/journals/ieeesp/NguyenS11>
rdfs:seeAlso <http://dblp.uni-trier.de/db/journals/ieeesp/ieeesp9.html#NguyenS11>
rdfs:seeAlso <https://doi.org/10.1109/MSP.2010.145>
dc:subject D.0 General, D.2.4.d Formal methods, D.4.6.a Access controls, D.4.6.b Authentication, K.4.4.f Security, K.4.4.g Internet security policies, K.6.5.a Authentication, K.6.5.c Invasive software (viruses, worms, Trojan horses), K.6.5.e Unauthorized access (hacking, phreaking), K.6.m.b Security, C.4.f Reliability, availability, and serviceability, D.2.9.m Risk management, D.4.5.e High availability, D.4.6.d Information flow controls, Intrusion Tolerance, Data exfiltration, (xsd:string)
dc:title A Comparison of Intrusion-Tolerant System Architectures. (xsd:string)
dc:type <http://purl.org/dc/dcmitype/Text>
rdf:type swrc:Article
rdf:type foaf:Document
swrc:volume 9 (xsd:string)