咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 计算机科学与技术...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电气工程
    • 2 篇 电子科学与技术(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 信息与通信工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 3 篇 virtual machine ...
  • 1 篇 zero-day attacks
  • 1 篇 system calls
  • 1 篇 ransomware
  • 1 篇 virtualization
  • 1 篇 forensic image b...
  • 1 篇 digital forensic...
  • 1 篇 fine-grained sem...
  • 1 篇 transparent moni...

机构

  • 1 篇 information&comp...
  • 1 篇 the state key la...
  • 1 篇 school of softwa...
  • 1 篇 key laboratory o...
  • 1 篇 school of comput...

作者

  • 1 篇 farag azzedin
  • 1 篇 sun yongqing
  • 1 篇 song zheng
  • 1 篇 zhu yinghong
  • 1 篇 zhao lei
  • 1 篇 md mahfuzur rahm...
  • 1 篇 wang lina
  • 1 篇 xu lai
  • 1 篇 jin bo
  • 1 篇 husam suwad
  • 1 篇 zhang hao

语言

  • 2 篇 英文
  • 1 篇 中文
检索条件"主题词=virtual machine introspection"
3 条 记 录,以下是1-10 订阅
排序:
An Asset-Based Approach to Mitigate Zero-Day Ransomware Attacks
收藏 引用
Computers, Materials & Continua 2022年 第11期73卷 3003-3020页
作者: Farag Azzedin Husam Suwad Md Mahfuzur Rahman Information&Computer Science Department KFUPMDhahranKSA
This article presents an asset-based security system where security practitioners build their systems based on information they own and not solicited by observing attackers’*** security solutions rely on information ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
cMonitor: VMI-Based Fine-Grained Monitoring Mechanism in Cloud
收藏 引用
Wuhan University Journal of Natural Sciences 2014年 第5期19卷 393-397页
作者: ZHANG Hao ZHAO Lei XU Lai WANG Lina School of Computer/The Key Laboratory of Aerospace Information and Trusted Computing of Ministry of Education Wuhan University The State Key Laboratory for Novel Software Technology Nanjing University
For the lack of detailed semantic in prior works, a transparent fine-grained monitoring technique (cMonitor) is pro- posed. Deployed outside the virtual machines, the cMonitor util- izes the elevated privileges of t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Investigating the Implications of virtualization for Digital Forensics
收藏 引用
China Communications 2010年 第6期7卷 100-106页
作者: Song Zheng Jin Bo Zhu Yinghong Sun Yongqing School of Software Shanghai Jiao Tong University Shanghai 200240 China Key Laboratory of Information Network Security Ministry of Public Security People's Republic of China (The Third Research Institute of Ministry of Public Security) Shanghai 201204 China
Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential role... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论