共 65 条
- [21] ReVirt: Enabling intrusion analysis through virtual-machine logging and replay [J]. USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2002, : 211 - 224
- [24] Fontugne Romain, 2010, P 6 INT C CO NEXT 20, DOI DOI 10.1145/1921168.1921179
- [25] FOSTER JC, 2007, METASPLOIT TOOLKIT P
- [26] Evaluation of intrusion detectors: A decision theory approach [J]. 2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, : 50 - 61
- [27] Garfinkel M., 2003, NDSS, P191
- [28] Griffin J., 2003, FEASIBILITY INTRUSIO
- [29] Hall M, 2002, LECT NOTES COMPUT SC, V2516, P239
- [30] Hassanzadeh Amin., 2011, Proceedings of the 20th International Conference on Computer Communications and Networks (ICCCN), P1