[1]
|
D. Russell and G. T. Ganemi Sr., “Computer Security Basics,” O’ Reilly and Asso. Inc., Sebastopol, 2006.
|
[2]
|
S.-K. Kim, “Enhanced Networked Server mgt. with Random Remote Backups,” Proceedings of SPIE 5244, Orlando, 7 September 2003, pp. 106-114.
doi:10.1117/12.511412
|
[3]
|
S.-K. Kim, “Enhanced Management Method of Storage Area Network (SAN) Server with Random Remote Backups,” Mathematical and Computer Modelling, Vol. 42, No. 9-10, 2005, pp. 947-958.
doi:10.1016/j.mcm.2005.06.006
|
[4]
|
S.-K. Kim, “Enhanced Stochastic Methodology for Combined Architecture of e-Commerce and Security Networks,” Mathematical Problems in Engineering, 2009, Vol. 2009, 2009, Article ID: 691680.
|
[5]
|
J. H. Dshalalow, “On a Duality Principle in Processes of Servicing Machines with Double Control,” Journal of Applied Mathematics, Vo. 1, No. 3, 1988, pp. 245-251.
|
[6]
|
J. H. Dshalalow, “Queueing Systems with State Dependent Parameters,” In: J. H. Dshalalow, Ed., Frontiers in Queueing, CRC Press, Boca Raton, 1997, pp. 61-116.
|
[7]
|
L. Takacs, “Some Probability Questions in the Theory of Telephone Traffic,” Magyar Tudomanyos Akademia. Matematikai es Fizikai Osztaly Kozleményei, Vol. 8, 1958, pp. 155-175.
|
[8]
|
S.-K. Kim, “Design of Stochastic Hitless-Prediction Router by Using the First Exceed Level Theory,” Mathematical Methods in the Applied Sciences, Vol. 28, No. 12, 2005, pp. 1481-1490. doi:10.1002/mma.626
|
[9]
|
J. H. Dshalalow, “On the Multiserver Queue with Finite Waiting Room and Controlled Input,” Advanced Applied Probability, Vol. 17, No. 2, 1985, pp. 408-423.
doi:10.2307/1427148
|
[10]
|
E. Cinlar, “Introduction to Stochastic Processes,” Prentice Hall, Englewood Cliffs, 1975.
|
[11]
|
S.-K. Kim, “Design of Enhanced Software Protection Architecutre by Using Theory of Inventive Problem Solving,” IEEE Proceedings of IEEM, Hong Kong, 8-11 December 2009, pp. 978-982.
|