×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [intrusion time]
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System Hai Wang and Peng Liu Cyber Security Lab Pennsylvania State University
214 views
WHEN PATROLMEN BECOME CORRUPTED: FENCE MONITORING BY UNRELIABLE ROBOTS JUREK CZYZOWICZ (UNIVERSITÉ DU QUÉBEC EN OUTAOUAIS) JOINT WORK WITH L.GĄSIENIEC,
218 views