-
1
-
-
0019613332
-
The Origin of the VM/370 Time-Sharing System
-
Creasy R. J., "The Origin of the VM/370 Time-Sharing System", IBM Journal of Research and Development, vol. 25, no. 5, 1981, pp483-490.
-
(1981)
IBM Journal of Research and Development
, vol.25
, Issue.5
, pp. 483-490
-
-
Creasy, R.J.1
-
2
-
-
84926427148
-
Survey of virtual machine research
-
Goldberg R. P., "Survey of virtual machine research", IEEE Computer Magazine, vol. 7, no. 6, 1974, pp 34-45.
-
(1974)
IEEE Computer Magazine
, vol.7
, Issue.6
, pp. 34-45
-
-
Goldberg, R.P.1
-
3
-
-
20444402396
-
The Reincarnation of Virtual Machines
-
July/August
-
Rosenblurn M., "The Reincarnation of Virtual Machines", ACM Queue, vol. 2, no. 5 - July/August 2004.
-
(2004)
ACM Queue
, vol.2
, Issue.5
-
-
Rosenblurn, M.1
-
4
-
-
0031269854
-
Disco: Running commodity operating systems on scalable multiprocessors
-
Bugnion, E., Devine, S., Govil, K., Rosenblum, M., "Disco: Running commodity operating systems on scalable multiprocessors", ACM Transactions on Computer Systems, vol. 15, no. 4, 1997, pp. 412-447.
-
(1997)
ACM Transactions on Computer Systems
, vol.15
, Issue.4
, pp. 412-447
-
-
Bugnion, E.1
Devine, S.2
Govil, K.3
Rosenblum, M.4
-
5
-
-
84952007163
-
-
retrieved April 26, 2008
-
X86 Virtualization, http://en.wikipcdia.org/wiki/X86-virtualization, retrieved April 26, 2008
-
X86 Virtualization
-
-
-
6
-
-
1642438948
-
An innovative hands-on laboratory for teaching a networking course
-
Session T2C, Boulder, CO, November 5-8
-
Nakagawa, Y., Suda, H., Ukigai, M., Miida, Y., "An innovative hands-on laboratory for teaching a networking course", Proceedings of the 33 rd ASEE/IEEE Frontiers in Education Conference, Session T2C, 14-20, Boulder, CO, November 5-8, 2003
-
(2003)
Proceedings of the 33 rd ASEE/IEEE Frontiers in Education Conference
, pp. 14-20
-
-
Nakagawa, Y.1
Suda, H.2
Ukigai, M.3
Miida, Y.4
-
8
-
-
85029041977
-
Using Virtual Machine Technology in an Undergraduate Intrusion Detection Lab
-
Li, P., Lunsford, P., Mohammed, T., Toderick, L., Li, C., "Using Virtual Machine Technology in an Undergraduate Intrusion Detection Lab", Proceedings of 2007 ASEE Annual Conference and Exposition, 2007.
-
(2007)
Proceedings of 2007 ASEE Annual Conference and Exposition
-
-
Li, P.1
Lunsford, P.2
Mohammed, T.3
Toderick, L.4
Li, C.5
-
9
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
Lippmann, R. P., Fried, D. J., Graf, I., Haines, J. W., Kendall, K. R., McClung, D., Weber, D., Webster, S. E., Wysehogrod, D., Cunningham, R. K., Zissman, M. A., "Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation", Proceedings of DARPA Information Survivability Conference and Exposition, vol. 2, 2000, pp. 12-26.
-
(2000)
Proceedings of DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 12-26
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wysehogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
10
-
-
69249205008
-
-
retrieved April 26, 2008
-
DARPA Intrusion Detection Data Sets, http://www.ll.mit.edu/mission/ communications/ist/corpora/ideval/dat a/index.html, retrieved April 26, 2008.
-
DARPA Intrusion Detection Data Sets
-
-
-
13
-
-
84868894620
-
-
retrieved April 26, 2008
-
Samples of live malware, http://www.offensivecomputing.net, retrieved April 26, 2008.
-
Samples of live malware
-
-
|