Author:
Yang Xundi,Qiu Kefan,Zhang Quanxin
Publisher
Springer Nature Switzerland
Reference11 articles.
1. Li, Y., Yao, S., Zhang, R., et al.: Analyzing host security using D-S evidence theory and multisource information fusion. Int. J. Intell. Syst. 36(2), 1053–1068 (2021)
2. Patel, K., Faccin, J., Hamou-Lhadj, A., et al.: The sense of logging in the linux kernel. Empir. Softw. Eng. 27(6), 153 (2022)
3. Ma, S., Zhai, J., Kwon, Y., et al.: Kernel-supported cost-effective audit logging for causality tracking. In: 2018 USENIX Annual Technical Conference (USENIX ATC 18), pp. 241–254 (2018)
4. Tan, Y., Xue, Y., Liang, C., et al.: A root privilege management scheme with revocable authorization for Android devices[J]. J. Netw. Comput. Appl. 107, 69–82 (2018)
5. Xue, Y., Tan, Y., Liang, C., et al.: RootAgency: a digital signature-based root privilege management agency for cloud terminal devices. Inf. Sci. 444, 36–50 (2018)