1Lin P,Distributed and Parallel Databases,2000年,8卷,1期,7页
2Jajodia S,Proc IST 4th Symposium on Protecting NATO Information Systems,1999年,20-1-20-7页
3D. O'Brien, R, Smith, T. Kappel, and C. Bitzer, Intrusion tolerant via network layer controls, in Proceedings of the DARPA Infomaation Survivability Conference and Exposition(DISCEX'03), pp. 90-96, April 2003.
4A. Franz, R.. Mista,D. Bakken, C, Dyreson,and M. Medidi,"Mr. fi.tfiorr A programmable data fi.tfion middleware subsytem with a tunable statistical profiling service,"in Proceedings of the International Conference on Dependable Systems and Networks(DSN-2002), pp, 273-278, 2002.
5R. Uppalli, R. Wang, and F. Wang, Design of a ballot monitor for an intrusion tolerant system/in Supplemental Volume of the International Conference on Dependable Systems and Networks (DSN-2002), pp. B60-b61, 2002.