Author:
Gantikow Holger,Reich Christoph,Knahl Martin,Clarke Nathan
Publisher
Springer International Publishing
Reference39 articles.
1. Abed, A.S., Clancy, T.C., Levy, D.S.: Applying bag of system calls for anomalous behavior detection of applications in linux containers. 2015 IEEE Globecom Workshops, GC Wkshps 2015 - Proceedings (2015).
https://doi.org/10.1109/GLOCOMW.2015.7414047
2. Alex Borhani: Anomaly Detection, Alerting, and Incident Response for Containers. SANS Institute InfoSec Reading Room (GIAC GCIH Gold Certification) (2017)
3. Arnautov, S., Trach, B., Gregor, F., Knauth, T., Martin, A., Priebe, C., Lind, J., Muthukumaran, D., Stillwell, M.L., Goltzsche, D., Eyers, D., Pietzuch, P., Fetzer, C.: SCONE: Secure Linux Containers with Intel SGX. Osdi pp. 689–704 (2016).
https://doi.org/10.5281/ZENODO.163059
4. Chelladhurai, J., Chelliah, P.R., Kumar, S.A.: Securing docker containers from Denial of Service (DoS) attacks. Proceedings - 2016 IEEE International Conference on Services Computing, SCC 2016 pp. 856–859 (2016).
https://doi.org/10.1109/SCC.2016.123
5. Chikvashvili, Y.: Cryptocurrency Miners Abusing Containers: Anatomy of an (Attempted) Attack. [ONLINE] Available at:
https://blog.aquasec.com/cryptocurrency-miners-abusing-containers-anatomy-of-an-attempted-attack
(2019), [Accessed 31 July 2019]
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献