Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game?
暂无分享,去创建一个
Dimitris Gritzalis | Theodoros K. Apostolopoulos | Nikos Virvilis | D. Gritzalis | T. Apostolopoulos | Nikos Virvilis
[1] M. Schunter,et al. An Open Trusted Computing Architecture — Secure Virtual Machines Enabling User-Defined Policy Enforcement , 2006 .
[2] Dimitris Gritzalis,et al. Design of a neural network for recognition and classification of computer viruses , 1995, Comput. Secur..
[3] Rolf Oppliger,et al. Does trusted computing remedy computer security problems? , 2005, IEEE Security & Privacy Magazine.
[4] D A Gritzalis,et al. Enhancing security and improving interoperability in healthcare information systems. , 1998, Medical informatics = Medecine et informatique.
[5] David Lie,et al. Manitou: a layer-below approach to fighting malware , 2006, ASID '06.
[6] Levente Buttyán,et al. Duqu: Analysis, Detection, and Lessons Learned , 2012 .
[7] Dimitris Gritzalis,et al. Embedding privacy in IT applications development , 2004, Inf. Manag. Comput. Secur..
[8] Levente Buttyán,et al. The Cousins of Stuxnet: Duqu, Flame, and Gauss , 2012, Future Internet.
[9] Dimitris Gritzalis,et al. An Insider Threat Prediction Model , 2010, TrustBus.
[10] Dimitris Gritzalis,et al. On the Feasibility of Malware Attacks in Smartphone Platforms , 2011, ICETE.
[11] Ahmad-Reza Sadeghi,et al. Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[12] Dimitris Gritzalis,et al. Model for Network Behaviour under Viral Attack , 1996 .
[13] Paul G. Spirakis,et al. Intrusion detection: Approach and performance issues of the SECURENET system , 1994, Comput. Secur..
[14] Thomas M. Chen,et al. Lessons from Stuxnet , 2011, Computer.
[15] A. Kohn. [Computer viruses]. , 1989, Harefuah.
[16] L. Najjar. The missing link. , 2003, Dental assistant.
[17] Dimitris Gritzalis,et al. Smartphone security evaluation The malware attack case , 2011, Proceedings of the International Conference on Security and Cryptography.
[18] Paul G. Spirakis,et al. Attack Modelling in Open Network Environments , 1996, Communications and Multimedia Security.
[19] Eric Chien,et al. W32.Duqu: The Precursor to the Next Stuxnet , 2012, LEET.