-
1
-
-
46449092367
-
-
Science in China Press, Ch
-
Shen Changxiang, Zhang Huanguo, Feng Dengguo, et al, "Summary of Information Security", Science in China Press, 2007(2), pp. 129-150. (Ch)
-
(2007)
Summary of Information Security
, Issue.2
, pp. 129-150
-
-
Shen, C.1
Zhang, H.2
Feng, D.3
-
2
-
-
20444411497
-
Research on Trustworthy Networks
-
Ch
-
Lin Chuang, Peng Xuehai, "Research on Trustworthy Networks", Chinese Journal of Computers, 2005(5), pp. 751-758. (Ch)
-
(2005)
Chinese Journal of Computers
, Issue.5
, pp. 751-758
-
-
Lin, C.1
Peng, X.2
-
3
-
-
20144368816
-
-
Duan Yunsu, Liu Xin, Chen Zhong, Analysis on Combined Security Efficiency and Vulnerability for Information System Security Evaluation, Journal of Peking University(Natural Science Edition), 2005(3), pp. 484-490.(Ch).
-
Duan Yunsu, Liu Xin, Chen Zhong, "Analysis on Combined Security Efficiency and Vulnerability for Information System Security Evaluation", Journal of Peking University(Natural Science Edition), 2005(3), pp. 484-490.(Ch).
-
-
-
-
4
-
-
58349086732
-
-
Zhang Huanguo, Luo Jie, Jin Gang, Development of Trusted Computing Research, Journal of Wuhan University(Natural Science Edition), 2006(5), pp. 513-518. (Ch)
-
Zhang Huanguo, Luo Jie, Jin Gang, "Development of Trusted Computing Research", Journal of Wuhan University(Natural Science Edition), 2006(5), pp. 513-518. (Ch)
-
-
-
-
5
-
-
0029716418
-
A Sense of Self for Unix Processes
-
Washington, D C: IEEE Computer Society Press
-
Forrest S, Hofmeyr S, Somayaji A, et al. "A Sense of Self for Unix Processes", Proceedings of the 1996 IEEE Symposium on Security and Privacy. Washington, D C: IEEE Computer Society Press, 1996, pp. 120-128.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
-
6
-
-
0032313923
-
A. Intrusion Detection Using Sequences of System Calls
-
Hofmeyr S, Forrest S, Somayaji, "A. Intrusion Detection Using Sequences of System Calls", Journal of Computer Security, 1998 (6), pp. 151-180.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 151-180
-
-
Hofmeyr, S.1
Forrest, S.2
Somayaji3
-
7
-
-
84944248021
-
Intrusion detection using variable length audit trail patterns
-
Springer2Verlag, London, U K
-
rd International Workshop on Recent Advances in Intrusion Detection, Springer2Verlag, London, U K, 2000, pp.110-129.
-
(2000)
rd International Workshop on Recent Advances in Intrusion Detection
, pp. 110-129
-
-
Wepsi, A.1
Dacier, M.2
Debar, H.3
-
8
-
-
0034829697
-
A fast automation-based method for detecting anomalous program behaviors
-
IEEE Computer Society, Washington, DC, USA
-
Sekar R., Bendre M., Dhurjati D., et al, "A fast automation-based method for detecting anomalous program behaviors", Proceedings of t he 2001 IEEE Symposium on Security and Privacy. IEEE Computer Society, Washington, DC, USA, 2001, pp. 144-149.
-
(2001)
Proceedings of t he 2001 IEEE Symposium on Security and Privacy
, pp. 144-149
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
-
9
-
-
28344446955
-
Polymorphic Malicious Executable Scanner by API Sequence Analysis
-
Washington D C: IEEE Computer Society Press
-
Xu Jianyun, Sung Andrew H, Chavez Patrick, et al, "Polymorphic Malicious Executable Scanner by API Sequence Analysis", Fourth International Conference on Hybrid Intelligent Systems (HIS'04). Washington D C: IEEE Computer Society Press, 2004, pp. 378-383.
-
(2004)
Fourth International Conference on Hybrid Intelligent Systems (HIS'04)
, pp. 378-383
-
-
Sung, X.A.H.1
Patrick, C.2
-
10
-
-
84924223669
-
Static Analysis of Executables to Detect Malicious Patterns
-
Washington D C. Berkeley, pp
-
Christodorescu Mihai, Jha Somesh, "Static Analysis of Executables to Detect Malicious Patterns", Proceedings of the 12th USENIX Security Symposium, Washington D C. Berkeley, pp.169-186.
-
Proceedings of the 12th USENIX Security Symposium
, pp. 169-186
-
-
Mihai, C.1
Somesh, J.2
|