Author:
Soni Jayesh,Peddoju Suresh K.,Prabakar Nagarajan,Upadhyay Himanshu
Reference38 articles.
1. Peddoju SK, Upadhyay H, Lagos L (2020) File integrity monitoring tools: issues, challenges, and solutions. Concurr Comput Pract Exper e5825. https://doi.org/https://doi.org/10.1002/cpe.5825
2. Suresh Kumar P, Ramachandram S (2019) Fuzzy-based integration of security and trust in distributed computing. In: Soft computing for problem solving. Advances in intelligent systems and computing, vol 816. Springer, Singapore
3. Ligh MH, Case A, Levy J, Walters A (2014) The art of memory forensics
4. Xen Project (2013) available at https://www.xenproject.org/
5. Hizver J, Chiueh T (2014) Real-time deep virtual machine introspection and its applications.ACM SIGPLAN Notices 49(7)
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献