Detecting past and present intrusions through vulnerability-specific predicates
Top Cited Papers
- 20 October 2005
- proceedings article
- Published by Association for Computing Machinery (ACM)
- Vol. 39 (5) , 91-104
- https://doi.org/10.1145/1095810.1095820
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- ShieldPublished by Association for Computing Machinery (ACM) ,2004
- Xen and the art of virtualizationPublished by Association for Computing Machinery (ACM) ,2003
- A "flight data recorder" for enabling full-system multiprocessor deterministic replayPublished by Association for Computing Machinery (ACM) ,2003
- Simics: A full system simulation platformComputer, 2002
- BASEPublished by Association for Computing Machinery (ACM) ,2001
- Dynamic software updatingPublished by Association for Computing Machinery (ACM) ,2001
- Windows of vulnerability: a case study analysisComputer, 2000
- Using the SimOS machine simulator to study complex computer systemsACM Transactions on Modeling and Computer Simulation, 1997
- Dealing with disasterPublished by Association for Computing Machinery (ACM) ,1996
- Hypervisor-based fault toleranceACM Transactions on Computer Systems, 1996