Author:
Milea Narcisa Andreea,Khoo Siau Cheng,Lo David,Pop Cristian
Publisher
Springer Berlin Heidelberg
Reference24 articles.
1. Operation aurora (2010),
http://en.wikipedia.org/wiki/Operation_Aurora#Response_and_aftermath
2. Agency, N.S.: Security-enhanced linux (2008),
http://www.nsa.gov/selinux
3. Broder, A., Mitzenmacher, M.: Network applications of bloom filters: A survey. Internet Mathematics (2004)
4. Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. Tech. rep., University of Wisconsin, Madison (2003)
5. Christodorescu, M., Jha, S., Kruegel, C.: Mining specifications of malicious behavior. In: India Software Engineering Conference. ACM (2008)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A System-level Behavioral Detection Framework for Compromised CPS Devices;ACM Transactions on Cyber-Physical Systems;2020-04-30
2. Clustering-Based Predictive Process Monitoring;IEEE Transactions on Services Computing;2019-11-01
3. Runtime Verification Monitor Construction for Three-valued PPTL;Structured Object-Oriented Formal Language and Method;2017
4. Heterogeneous Architectures: Malware and Countermeasures;Secure System Design and Trustable Computing;2016
5. Software health management with Bayesian networks;Innovations in Systems and Software Engineering;2013-06-21