메뉴 건너뛰기




Volumn 39, Issue 5, 2005, Pages 163-176

The Taser intrusion recovery system

Author keywords

File systems; Intrusion analysis; Intrusion recovery; Snapshots

Indexed keywords

FILE SYSTEMS; INTRUSION ANALYSIS; INTRUSION RECOVERY; SNAPSHOTS;

EID: 33845387415     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1095809.1095826     Document Type: Article
Times cited : (66)

References (33)
  • 14
    • 0033871806 scopus 로고    scopus 로고
    • Rewriting histories: Recovering from malicious transactions
    • Peng Liu, Paul Ammann, and Sushil Jajodia. Rewriting histories: Recovering from malicious transactions. Distributed and Parallel Databases, 8(1):7-40, 2000.
    • (2000) Distributed and Parallel Databases , vol.8 , Issue.1 , pp. 7-40
    • Liu, P.1    Ammann, P.2    Jajodia, S.3
  • 16
  • 18
    • 84878346861 scopus 로고    scopus 로고
    • Improving host security with system call policies
    • August
    • N. Provos. Improving host security with system call policies. In Proceedings of the USENIX Security Symposium, pages 257-272, August 2003.
    • (2003) Proceedings of the USENIX Security Symposium , pp. 257-272
    • Provos, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.