Author:
Kiperberg Michael,Yehuda Raz Ben,Zaidenberg Nezer J.
Publisher
Springer International Publishing
Reference38 articles.
1. Bilge, L., Dumitraş, T.: Before we knew it: an empirical study of zero-day attacks in the real world. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 833–844 (2012)
2. Bilge, L., Sen, S., Balzarotti, D., Kirda, E., Kruegel, C.: Exposure: a passive DNS analysis service to detect and report malicious domains. ACM Trans. Inf. Syst. Secur. (TISSEC) 16(4), 1–28 (2014)
3. Lecture Notes in Computer Science;P Chen,2015
4. Cook, K.: Kernel address space layout randomization. Linux Security Summit (2013)
5. Deshane, T., Shepherd, Z., Matthews, J., Ben-Yehuda, M., Shah, A., Rao, B.: Quantitative comparison of Xen and KVM, pp. 1–2. Xen Summit, Boston (2008)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Virtualized network packet inspection;Computer Networks;2024-09
2. PDIFT++: System-Wide Memory Tracking Using a Single-Process Memory Tracker;SN Computer Science;2024-01-20
3. Implementation method of non-bypassable PC application firewalls using virtualization technologies;2023 IEEE International Conference on High Performance Computing & Communications, Data Science & Systems, Smart City & Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys);2023-12-17