메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Active security

Author keywords

Central management; Digital forensics; Network security

Indexed keywords

ACTIVE SECURITIES; ACTIVE SECURITY SYSTEMS; ATTACK SCENARIOS; DIGITAL FORENSIC; FORENSIC EVIDENCE; INTRUSION DETECTION SYSTEMS; PROGRAMMING ENVIRONMENT; SOFTWARE-DEFINED NETWORKINGS;

EID: 84893266021     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2535771.2535794     Document Type: Conference Paper
Times cited : (16)

References (38)
  • 2
    • 84893254138 scopus 로고    scopus 로고
    • Immunity debugger. http://www.immunityinc.com/products-immdbg.shtml.
  • 3
    • 84893260846 scopus 로고    scopus 로고
    • Solarwinds. http://www.solarwinds.com/log-event-manager/active-response- library.aspx.
  • 4
    • 84893247701 scopus 로고    scopus 로고
    • VMware Horizon Mobile. http://www.vmware.com/products/desktop- virtualization/mobile/overview.html.
  • 6
    • 84893244969 scopus 로고    scopus 로고
    • Floodlight. http://floodlight.openflowhub.org, 2013.
    • (2013)
  • 7
    • 84893247788 scopus 로고    scopus 로고
    • Linux memory extrator. https://code.google.com/p/lime-forensics/, 2013.
    • (2013) Linux Memory Extrator
  • 8
    • 84893282073 scopus 로고    scopus 로고
    • Snort. http://www.snort.org/, 2013.
    • (2013)
  • 19
    • 34447559706 scopus 로고    scopus 로고
    • The VAD tree: A process-eye view of physical memory
    • B. Dolan-Gavitt. The VAD tree: A process-eye view of physical memory. Digital Investigation, 4: 62-64, 2007.
    • (2007) Digital Investigation , vol.4 , pp. 62-64
    • Dolan-Gavitt, B.1
  • 21
    • 84893208576 scopus 로고    scopus 로고
    • Oct
    • S. Garfinkel. The criminal cloud. http://www.technologyreview.com/news/ 425770/the-criminal-cloud/, Oct 2011.
    • (2011) The Criminal Cloud
    • Garfinkel, S.1
  • 36
    • 3042617182 scopus 로고    scopus 로고
    • A quantitative study of firewall configuration errors
    • A. Wool. A quantitative study of firewall configuration errors. Computer, 37: 62-67, 2004.
    • (2004) Computer , vol.37 , pp. 62-67
    • Wool, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.