Login / Signup

Aspects of adaptive reconfiguration in a scalable intrusion tolerant system.

Stephanie BryantFeiyi Wang
Published in: Complex. (2003)
Keyphrases
  • software aging
  • database
  • real world
  • cloud computing
  • anomaly detection