[1] J.-P. Vasseur, M. Pickavet, and P. Demeester, Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS. (San Francisco: Morgan Kaufmann, 2004).

[2] D. Tipper, S. Ramaswamy, and T. Dahlberg, “PCS Network Survivability,” Proceedings of the IEEE Wireless Communication and Networking Conference, New Orleans, LA, 1999, pp. 1028–1032.

[3] B. B. Madan, K. Goseva-Popstojanova, K. Vaidyanathan, and K. S. Trivedi, “A Method for Modeling and Quantifying the Security Attributes of Intrusion Tolerant Systems,” Performance Evaluation 56 (2004): 167–186.

[4] D. Wang, B. Madan, and K. S. Trivedi, “Security Analysis of SITAR Intrusion-Tolerant System,” Proceedings of the ACM workshop Survivable and Self-Regenerative Systems, Fairfax, ...

Get Information Assurance now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.