ќ каналах скрытых, потайных, побочных


Ћитература - часть 4


Ч Proceedings of the International Conference on Autonomic Computing (ICAC'04). -- IEEE, 2004

[37] F. Sultan , A. Bohra , S. Smaldone , Y. Pan , P. Gallard , I. Neamtiu , L. Iftode -- Recovering Internet Service Sessions from Operating System Failures. -- IEEE Internet Computing, 2005, March/April

[38] J.B. Grizzard , S. Krasser , H.L. Owen , G.J. Conti , E.R. Dodson -- Towards an Approach for Automatically Repairing Compromised Network Systems. Ч Proceedings of the Third IEEE International Symposium on Network Computing and Applications (NCA'04). -- IEEE, 2004

[39] A. Goel , K. Po , K. Farhadi , Z. Li , E. de Lara -- The Taser Intrusion Recovery System. Ч Proceedings of the SOSP'05. -- ACM, 2005

[40] J. Levine , J. Grizzard , H. Owen -- A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. Ч Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04). -- IEEE, 2004

[41] C. Kruegel , W. Robesrtson , G. Vigna -- Detecting Kernel-Level Rootkits Through Binary Analysis. Ч Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04). -- IEEE, 2004

[42] H. Xu , W. Du , S.J. Chapin -- Detecting Exploit Code Execution in Loadable Kernel Modules. Ч Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04). -- IEEE, 2004

[43] Y.-M. Wang , D. Beck , B. Vo , R. Roussev , C. Verbowski -- Detecting Stealth Software with Strider GhostBuster. Ч Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN'05). -- IEEE, 2005

[44] S. Ring , D. Esler , E. Cole -- Self-Healing Mechanisms for Kernel System Compromises. Ч Proceedings of the WOSS'04. -- ACM, 2004

[45] M. Laureano , C. Maziero , E. Jamhour -- Intrusion Detection in Virtual Machine Environments. Ч Proceedings of the 30th EUROMICRO Conference (EUROMICRO'04). -- IEEE, 2004

[46] M. Vrable , J. Ma , J. Chen , D. Moore , E. Vandekieft , A.C. Snoeren , G.M.Voelker , S. Savage -- Scalability, Fidelity, and Containment in the Potemkin Virtual Honeyfarm. Ч Proceedings of the SOSP'05. -- ACM, 2005

[47] S. Ring , E. Cole -- Taking a Lesson from Stealthy Rootkits. -- IEEE Security & Privacy, 2004, July/August

[48] W. Shi , H.-H.S. Lee , G. Gu , L. Falk -- An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor. Ч Proceedings of the Second International Conference on Autonomic Computing (ICAC'05) -- IEEE, 2005




Ќачало  Ќазад  



 нижный магазин