메뉴 건너뛰기




Volumn , Issue , 2005, Pages 163-176

The taser intrusion recovery system

Author keywords

file systems; intrusion analysis; intrusion recovery; snapshots

Indexed keywords

AUTOMATED RESOLUTION; COMPUTING RESOURCE; FILE SYSTEMS; INTRUSION ANALYSIS; INTRUSION RECOVERY; NEXT GENERATION SYSTEMS; SNAPSHOTS; SYSTEM MANAGEMENT;

EID: 84885588230     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1095810.1095826     Document Type: Conference Paper
Times cited : (88)

References (33)
  • 14
    • 0033871806 scopus 로고    scopus 로고
    • Rewriting histories: Recovering from malicious transactions
    • Peng Liu, Paul Ammann, and Sushil Jajodia. Rewriting histories: Recovering from malicious transactions. Distributed and Parallel Databases, 8(1):7-40, 2000.
    • (2000) Distributed and Parallel Databases , vol.8 , Issue.1 , pp. 7-40
    • Liu, P.1    Ammann, P.2    Jajodia, S.3
  • 16
  • 18
    • 84878346861 scopus 로고    scopus 로고
    • Improving host security with system call policies
    • August
    • N. Provos. Improving host security with system call policies. In Proceedings of the USENIX Security Symposium, pages 257-272, August 2003.
    • (2003) Proceedings of the USENIX Security Symposium , pp. 257-272
    • Provos, N.1
  • 23
    • 84872311782 scopus 로고    scopus 로고
    • Linux on-the-fly kernel patching without LKM
    • sd and devik. December
    • sd and devik. Linux on-the-fly kernel patching without LKM. Phrack issue 58, December 2001.
    • (2001) Phrack , Issue.58


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.