Author:
Win Thu Yein,Tianfield Huaglory,Mair Quentin,Said Taimur Al,Rana Omer F.
Reference20 articles.
1. I. Ahmed, G. G. Richard III, A. Zoranic, and V. Roussev. Integrity checking of function pointers in kernel pools via virtual machine introspection.
2. S. S. Alarifi and S. D. Wolthusen. Detecting anomalies in iaas environments through virtual machine host system call analysis. In Internet Technology And Secured Transactions, 2012 International Conferece For, pages 211--218. IEEE, 2012.
3. S. Bahram, X. Jiang, Z. Wang, M. Grace, J. Li, D. Srinivasan, J. Rhee, and D. Xu. Dksm: Subverting virtual machine introspection for fun and profit. In Reliable Distributed Systems, 2010 29th IEEE Symposium on, pages 82--91. IEEE, 2010.
4. F. Baiardi and D. Sgandurra. Building trustworthy intrusion detection through vm introspection. In Information Assurance and Security, 2007. IAS 2007. Third International Symposium on, pages 209--214. IEEE, 2007.
5. C. Benninger, S. W. Neville, Y. O. Yazir, C. Matthews, and Y. Coady. Maitland: Lighter-weight vm introspection to support cyber-security in the cloud. In Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on, pages 471--478. IEEE, 2012.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献