Author:
Srivastava Abhinav,Giffin Jonathon
Publisher
Springer Berlin Heidelberg
Reference33 articles.
1. Baliga, A., Kamat, P., Iftode, L.: Lurking in the shadows: Identifying systemic threats to kernel data. In: IEEE Symposium on Security and Privacy, Oakland, CA (May 2007)
2. Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: 19 th ACM Symposium on Operating Systems Principles (SOSP), Bolton Landing, NY (October 2003)
3. Bellovin, S.: Distributed firewalls. login (November 1999)
4. Borders, K., Zhao, X., Prakash, A.: Siren: Catching evasive malware. In: IEEE Symposium on Security and Privacy, Oakland, CA (May 2005)
5. CERT. TCP SYN Flooding and IP Spoofing Attacks. CERT Advisory CS-1996-21 (Last accessed April 4 , 2008), http://www.cert.org/advisories/CA-1996-21.html
Cited by
43 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献