Attacking a High Performance Computer Cluster
暂无分享,去创建一个
[1] Eugene H. Spafford,et al. Generation of Application Level Audit Data via Library Interposition , 1998 .
[2] Gustavo Rodriguez-Rivera,et al. Kernel Korner: Loadable Kernel Module Programming and System Call Interception , 2001 .
[3] Zhen Liu,et al. A comparison of input representations in neural networks: a case study in intrusion detection , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[4] Timothy W. Curry,et al. Profiling and Tracing Dynamic Library Usage Via Interposition , 1994, USENIX Summer.
[5] Rob Williams,et al. Linux device drivers , 2006 .
[6] George Marsaglia,et al. Toward a universal random number generator , 1987 .