Next-Generation Honeynet Technology with Real-Time Forensics for U.S. Defense
暂无分享,去创建一个
[1] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[2] Herbert Bos,et al. Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation , 2006, EuroSys.
[3] Jon Crowcroft,et al. Honeycomb , 2004, Comput. Commun. Rev..
[4] Samuel T. King,et al. Detecting past and present intrusions through vulnerability-specific predicates , 2005, SOSP '05.
[5] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[6] N. Rowe. Deception in defense of computer systems from cyber-attack , 2007 .
[7] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.