共 25 条
[1]
[Anonymous], 2003, P 19 ACM S OP SYST P, DOI [10.1145/1165389.945450, DOI 10.1145/1165389.945450]
[2]
Chai H. Q., 2010, COMPUTER SECURITY
[3]
Cohen J., 2013, MORE SECURE APACHE H
[4]
Das S. R. Devaraj, 2011, ADDING SECURITY APAC
[5]
Dean J, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE SIXTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDE '04), P137
[6]
Comparative Modeling and Verification of Pthreads and Dthreads
[J].
2016 IEEE 17TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE),
2016,
:132-140
[7]
Security Threats to Hadoop: Data Leakage Attacks and Investigation
[J].
IEEE NETWORK,
2017, 31 (02)
:67-71
[8]
Gupta P, 2015, 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), P118, DOI 10.1109/CCAA.2015.7148356
[9]
Hadoop, APACHE HADOOP