6th Annual Symposium on Information Assurance (ASIA '11)

作者: Sanjay Goel

DOI:

关键词: Computer scienceLibrary scienceInformation assurance

摘要:

参考文章(37)
William A. Arbaugh, Timothy Fraser, Nick L. Petroni, AAron Walters, An architecture for specification-based detection of semantic integrity violations in kernel dynamic data usenix security symposium. pp. 20- ,(2006)
Ryan Riley, Xuxian Jiang, Dongyan Xu, Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing recent advances in intrusion detection. pp. 1- 20 ,(2008) , 10.1007/978-3-540-87403-4_1
P. Papadimitratos, Z.J. Haas, Secure link state routing for mobile ad hoc networks symposium on applications and the internet. pp. 379- 383 ,(2003) , 10.1109/SAINTW.2003.1210190
Tal Garfinkel, Mendel Rosenblum, A Virtual Machine Introspection Based Architecture for Intrusion Detection. network and distributed system security symposium. ,(2003)
P.M. Chen, B.D. Noble, When virtual is better than real [operating system relocation to virtual machines] Proceedings Eighth Workshop on Hot Topics in Operating Systems. pp. 133- 138 ,(2001) , 10.1109/HOTOS.2001.990073
Xuxian Jiang, Xinyuan Wang, Out-of-the-Box monitoring of VM-based high-interaction honeypots recent advances in intrusion detection. pp. 198- 218 ,(2007) , 10.1007/978-3-540-74320-0_11
Hongmei Deng, Wei Li, D.P. Agrawal, Routing security in wireless ad hoc networks IEEE Communications Magazine. ,vol. 40, pp. 70- 75 ,(2002) , 10.1109/MCOM.2002.1039859
Clemens Kolbitsch, Thorsten Holz, Christopher Kruegel, Engin Kirda, Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries ieee symposium on security and privacy. pp. 29- 44 ,(2010) , 10.1109/SP.2010.10
Hajime Inoue, Frank Adelstein, Robert A. Joyce, Visualization in testing a volatile memory forensic tool Digital Investigation. ,vol. 8, ,(2011) , 10.1016/J.DIIN.2011.05.006