共 37 条
[11]
CVE, 2008, CVE20080081
[12]
Goel A., 2005, SOSP 05, P163
[13]
Progressive Processing of System-Behavioral Query
[J].
35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA),
2019,
:378-389
[14]
Large-sample and deterministic confidence intervals for online aggregation
[J].
NINTH INTERNATIONAL CONFERENCE ON SCIENTIFIC AND STATISTICAL DATABASE MANAGEMENT, PROCEEDINGS,
1997,
:51-62
[15]
Hangal S, 2002, ICSE 2002: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, P291, DOI 10.1109/ICSE.2002.1007976
[16]
Hossain MN, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P487
[17]
Trail of Bytes: Efficient Support for Forensic Analysis
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:50-60
[18]
Lee K. H., 2013, Proceedings of the ACM Conference on Computer and Communications Security
[19]
Liu Yushan, 2018, NDSS
[20]
Ma S., 2015, NDSS