메뉴 건너뛰기




Volumn 3224, Issue , 2004, Pages 1-20

Automatic extraction of accurate application-specific sandboxing policy

Author keywords

Intrusion detection; Mimicry attack; Non deterministic finite state automaton; Sandboxing; System call graph

Indexed keywords

APPLICATION PROGRAMS; MERCURY (METAL); MONITORING; SEMANTICS; SERVERS; THROUGHPUT;

EID: 35048824326     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30143-1_1     Document Type: Article
Times cited : (14)

References (24)
  • 4
    • 33845594954 scopus 로고    scopus 로고
    • CERT Corrdingation Center. Cert summary cs-2003-01. http://www.cert.org/ summaries/, 2003.
    • (2003) Cert Summary Cs-2003-01.
  • 15
    • 84946410215 scopus 로고    scopus 로고
    • Detecting insider threats by monitoring system call activity
    • United States Military Academy West Point, New York, June
    • N. Nguyen, P. Reiher, and G. H. Kuenning. Detecting insider threats by monitoring system call activity. In IEEE Information Assurance Workshop, United States Military Academy West Point, New York, June 2003.
    • (2003) IEEE Information Assurance Workshop
    • Nguyen, N.1    Reiher, P.2    Kuenning, G.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.