-
2
-
-
20344391930
-
Intel virtualization technology
-
DOI 10.1109/MC.2005.163
-
Uhlig, R., Neiger, G., Rodgers, D., Santoni, A.L., Martins, F.C.M., Anderson, A.V., Bennett, S.M., Kagi, A., Leung, F.H., Smith, L. "Intel virtualization technology", IEEE Journal of Computer, vol. 38, May. 2005, pp. 48-56, doi:10.1109/MC.2005.163. (Pubitemid 40784342)
-
(2005)
Computer
, vol.38
, Issue.5
, pp. 48-56
-
-
Uhlig, R.1
Neiger, G.2
Rodgers, D.3
Santoni, A.L.4
Martins, F.C.M.5
Anderson, A.V.6
Bennett, S.M.7
Kagi, A.8
Leung, F.H.9
Smith, L.10
-
3
-
-
21644433634
-
Xen and the art of virtualization
-
Paul Barham, Boris Dragovic, Steven Hand, Tim Harris, Alex Ho, Ian Pratt, Andrew Warfield, "Xen and the art of virtualization", Proc. ACM Symp. Operating systems principles, 2003, pp.164-177.
-
(2003)
Proc. ACM Symp. Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Hand, S.3
Harris, T.4
Ho, A.5
Pratt, I.6
Warfield, A.7
-
4
-
-
1642516070
-
Honeynet project: Trapping hackers
-
Mar., doi: 10.1109/MSECP.2003.1193207
-
Spitzner, L., "Honeynet Project: trapping hackers", IEEE Journal of Security & Privacy, vol. 1, Mar. 2003, pp 15-23, doi: 10.1109/MSECP.2003.1193207.
-
(2003)
IEEE Journal of Security & Privacy
, vol.1
, pp. 15-23
-
-
Spitzner, L.1
-
5
-
-
62449333218
-
Quantifying performance properties of virtual machine
-
doi:10.1109/ISISE.2008.221
-
Xu, Xiaghua, Zhou, F, Jiang, Y, cheng, "Quantifying Performance Properties of Virtual Machine", Proc. IEEE International Symp. Information Science and Engineering (ISISE), 2008, pp. 24-28, doi:10.1109/ISISE.2008.221.
-
(2008)
Proc. IEEE International Symp. Information Science and Engineering (ISISE)
, pp. 24-28
-
-
Cheng1
Zhou, F.2
Jiang, Y.3
Xiaghua, X.4
-
6
-
-
33744479744
-
Apply data mining to defense-in-depth network security system
-
DOI 10.1109/AINA.2005.118, 1423668, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005
-
Nen-Fu Huang, Chia-Nan Kao, Gin-Yuan Jai, Chia-Lin Lin, " Apply data mining to defense-in-depth network security system", Proc. IEEE International Conference on Advanced Information Networking and Applications (AINA), 2005, vol. 1, pp. 159-162, doi: 10.1109/AINA.2005.118. (Pubitemid 43804003)
-
(2005)
Proceedings - International Conference on Advanced Information Networking and Applications, AINA
, vol.2
, pp. 159-162
-
-
Huang, N.-F.1
Kao, C.-N.2
Hun, H.-W.3
Jai, G.-Y.4
Lin, C.-L.5
-
7
-
-
2342580070
-
The honeywall CD-ROM
-
Mar., doi: 10.1109/MSECP.2004.1281253
-
JChamales, G., "The Honeywall CD-ROM", IEEE Journal of Security & Privacy, vol. 2, Mar. 2004, pp. 77-79, doi: 10.1109/MSECP.2004.1281253.
-
(2004)
IEEE Journal of Security & Privacy
, vol.2
, pp. 77-79
-
-
Jchamales, G.1
-
8
-
-
51649104949
-
Anatomy of a real-time intrusion prevention system
-
doi:10.1109/ICAC.2008.24
-
Koller, R., Rangaswami, R., Marrero, J., Hernandez, I., Smith, G., Barsilai, M., Necula, S., Sadjadi, S.M., Tao, Li, Merrill, K., "Anatomy of a Real-Time Intrusion Prevention System", Proc. IEEE International Conference on Autonomic Computing (ICAC), 2008, pp. 151-160, doi:10.1109/ICAC.2008.24.
-
(2008)
Proc. IEEE International Conference on Autonomic Computing (ICAC)
, pp. 151-160
-
-
Koller, R.1
Rangaswami, R.2
Marrero, J.3
Hernandez, I.4
Smith, G.5
Barsilai, M.6
Necula, S.7
Sadjadi, S.M.8
Tao, L.9
Merrill, K.10
-
9
-
-
58349093925
-
A novel hardware assisted full virtualization technique
-
doi:10.1109/ICYCS.2008.218
-
Wei Chen, Hongyi Lu, Li Shen, Nong Xiao, Dan Chen, "A Novel Hardware Assisted Full Virtualization Technique", Proc. IEEE International Conference for Young Computer Scientists (ICYCS), 2008, pp. 1292-1297, doi:10.1109/ICYCS.2008.218.
-
(2008)
Proc. IEEE International Conference for Young Computer Scientists (ICYCS)
, pp. 1292-1297
-
-
Chen, W.1
Lu, H.2
Shen, L.3
Xiao, N.4
Chen, D.5
-
10
-
-
0012109964
-
-
Honeynet Project Team, Second Edition, Addison Wesley Professional Publishers. May 27
-
Honeynet Project Team, Know Your Enemy : Learning about Security Threats, Second Edition, Addison Wesley Professional Publishers. May 27, 2004.
-
(2004)
Know Your Enemy : Learning about Security Threats
-
-
-
11
-
-
38949154490
-
Harnessing green IT: Principles and practices
-
DOI 10.1109/MITP.2008.10
-
Murugan, S., "Harnessing Green IT Principles Practices", IEEE Journal of IT Professional, vol. 10, Jan. 2008, pp. 24-33, doi: 10.1109/MITP.2008.10. (Pubitemid 351225229)
-
(2008)
IT Professional
, vol.10
, Issue.1
, pp. 24-33
-
-
Murugesan, S.1
-
12
-
-
33744467441
-
Development of security scanner with high portability and usability
-
DOI 10.1109/AINA.2005.163, 1423722, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005
-
Yoshimoto, M., Takata, T., "Development of security scanner with high portability and usability", Proc. IEEE International Conference on Advanced Information Networking and Applications (AINA), 2005, vol. 2, pp. 407-410, doi:10.1109/AINA.2005.163. (Pubitemid 43804057)
-
(2005)
Proceedings - International Conference on Advanced Information Networking and Applications, AINA
, vol.2
, pp. 407-411
-
-
Yoshimoto, M.1
Bista, B.B.2
Takata, T.3
-
13
-
-
70849116738
-
Borrowed-virtual-time scheduling
-
Kenneth J. Duda, D, R. Cheiton, "Borrowed-virtual-time scheduling", Proc. ACM symp. Operating systems principles, 1999, pp. 261-276.
-
(1999)
Proc. ACM Symp. Operating Systems Principles
, pp. 261-276
-
-
Kenneth, J.1
Duda, D.2
Cheiton, R.3
|