Login / Signup
The Design and Implementation of an Intrusion Tolerant System.
James C. Reynolds
James E. Just
Ed Lawson
Larry A. Clough
Ryan Maglich
Karl N. Levitt
Published in:
DSN (2002)
Keyphrases
</>
case study
data mining
design process
decision making
database systems
knowledge based systems