Author:
Haas Steffen,Sommer Robin,Fischer Mathias
Publisher
Springer International Publishing
Reference19 articles.
1. Lecture Notes in Computer Science;M Almgren,2001
2. Bates, A., Tian, D., Butler, K.R.B., Moyer, T.: Trustworthy whole-system provenance for the Linux Kernel. In: Proceedings of the 24th USENIX Conference on Security Symposium, pp. 319–334. USENIX Association (2015)
3. Bhatt, S., Manadhata, P.K., Zomlot, L.: The operational role of security information and event management systems. IEEE Secur. Priv. 12(5), 35–41 (2014). https://doi.org/10.1109/MSP.2014.103
4. Cai, M., Hwang, K., Kwok, Y.K., Song, S., Chen, Y.: Collaborative internet worm containment. IEEE Secur. Priv. 3(3), 25–33 (2005). https://doi.org/10.1109/MSP.2005.63
5. Lecture Notes in Computer Science;H Dreger,2005
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献