메뉴 건너뛰기




Volumn , Issue , 2004, Pages 389-392

Towards an approach for automatically repairing compromised network systems

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMMING INTERFACE (API); COMPROMISED NETWORK SYSTEMS; INTRUSION DETECTION SYSTEM (IDS); TRUSTED IMMUTABLE KERNEL EXTENSION (TIKE);

EID: 18844394534     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NCA.2004.1347806     Document Type: Conference Paper
Times cited : (3)

References (4)
  • 1
    • 2442553830 scopus 로고    scopus 로고
    • A methodology to characterize kernel level rootkit exploits that overwrite the system call table
    • IEEE, March
    • J. G. Levine, J. B. Grizzard, and H. L. Owen, "A methodology to characterize kernel level rootkit exploits that overwrite the system call table," in Proceedings of IEEE SoutheastCon. IEEE, March 2004, pp. 25-31.
    • (2004) Proceedings of IEEE SoutheastCon. , pp. 25-31
    • Levine, J.G.1    Grizzard, J.B.2    Owen, H.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.