共 8 条
[1]
Chen S, 2005, USENIX Association Proceedings of the 14th USENIX Security Symposium, P177
[2]
Chen S, 2005, I C DEPEND SYS NETWO, P378
[4]
Lattner C, 2004, INT SYM CODE GENER, P75, DOI 10.1109/CGO.2004.1281665
[5]
Nakka N, 2004, 2004 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, P585
[6]
Application-based metrics for strategic placement of detectors
[J].
11th Pacific Rim International Symposium on Dependable Computing, Proceedings,
2005,
:75-82
[7]
POHUA P, 1991, P 18 INT S COMP ARCH, P266
[8]
SEECOF M, 1991, RISKS DIGEST, V12