Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
Network intrusion detectionMukherjee, B. ; Heberlein, L.T. ; Levitt, K.N.IEEE network, 1994-05, Vol.8 (3), p.26-41 [Periódico revisado por pares]New York: IEEETexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
SIFT: Design and analysis of a fault-tolerant computer for aircraft controlWensley, J.H. ; Lamport, L. ; Goldberg, J. ; Green, M.W. ; Levitt, K.N. ; Melliar-Smith, P.M. ; Shostak, R.E. ; Weinstock, C.B.Proceedings of the IEEE, 1978-01, Vol.66 (10), p.1240-1255 [Periódico revisado por pares]IEEETexto completo disponível |
3 |
Material Type: Livro
|
![]() |
The fault-tolerant multiprocessor computerSmith, T.B. III ; Lala, J.H. ; Goldberg, J. ; Kautz, W.H. ; Melliar-Smith, P.M. ; Green, M.W. ; Levitt, K.N. ; Schwartz, R.L. ; Weinstock, C.B. ; Palumbo, D. ; Butler, R.W.United States: Noyes Publications,Park Ridge, NJ 1986Sem texto completo |
4 |
Material Type: Livro
|
![]() |
Fault-tolerant multiprocessor computerSmith, T.B. III ; Lala, J.H. ; Goldberg, J. ; Kautz, W.H. ; Melliar-Smith, P.M. ; Green, M.W. ; Levitt, K.N. ; Schwartz, R.L. ; Weinstock, C.B. ; Palumbo, D.L.United States: Noyes Publications,Park Ridge, NJ 1986Sem texto completo |
5 |
Material Type: Ata de Congresso
|
![]() |
A Formal Specification of the IEEE Floating-Point Standard with Application to the Verification of FJing Pan ; Levitt, K.N.1990 Conference Record Twenty-Fourth Asilomar Conference on Signals, Systems and Computers, 1990, 1990, Vol.1, p.505IEEETexto completo disponível |
6 |
Material Type: Ata de Congresso
|
![]() |
Applying the composition principle to verify a hierarchy of security serversHeckman, M.R. ; Levitt, K.N.Proceedings of the Thirty-First Hawaii International Conference on System Sciences, 1998, Vol.3, p.338-347 vol.3IEEETexto completo disponível |
7 |
Material Type: Ata de Congresso
|
![]() |
Towards a framework for worm-defense evaluationCheetancheri, S.G. ; Ma, D.L. ; Levitt, K.N. ; Heberlein, T.L.2006 IEEE International Performance Computing and Communications Conference, 2006, p.7 pp.-566IEEETexto completo disponível |
8 |
Material Type: Ata de Congresso
|
![]() |
A formal-specification based approach for protecting the domain name systemCheung, S. ; Levitt, K.N.Proceeding International Conference on Dependable Systems and Networks. DSN 2000, 2000, p.641-651Los Alamitos CA: IEEETexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
R70-38 The Time Required for Group MultiplicationLevitt, K.N.IEEE transactions on computers, 1970-09, Vol.C-19 (9), p.859-860 [Periódico revisado por pares]IEEETexto completo disponível |
10 |
Material Type: Ata de Congresso
|
![]() |
Detecting intrusions through attack signature analysisSnapp, S.R. ; Mukherjee, B. ; Levitt, K.N.United States 1991Sem texto completo |