1Bharat B.Madan,Katerina Goseva-Popstojanova,etc.A Method for Modeling and Quantifying the Security Attributes of Intrusion Tolerant Systems.Performance Evaluation.56(1-4),2004:167-186.
2Ellison Rober J,Fisher David A,Linger Richard C,etc.Survivability Protecting Your Critical System[J].IEEE Internet Computing.1999,3(6):55-63.
4Soumyo D.Moitra,Suresh L.Konda.A Simulation Model for Managing Survivability of Networked Information Systems,http://www.cert.org/research/00tr020.pdf,2000.