The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for rootkits with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2004-2006 (18) 2007 (18) 2008 (15) 2009-2010 (17) 2011-2015 (21) 2016-2020 (16) 2022-2024 (3)
Publication types (Num. hits)
article(26) incollection(5) inproceedings(77)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 95 occurrences of 60 keywords

Results
Found 108 publication records. Showing 108 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang Towards a VMM-based usage control framework for OS kernel integrity protection. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF kernel integrity, operating system protection, access control, authorization, security architecture, usage control, VMM, UCON
17Arvind Seshadri, Mark Luk, Ning Qu, Adrian Perrig SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. Search on Bibsonomy SOSP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF code attestation, memory virtualization, hypervisor, code injection attacks, preventing, code integrity
17Arati Baliga, Pandurang Kamat, Liviu Iftode Lurking in the Shadows: Identifying Systemic Threats to Kernel Data. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Mark Doernhoefer Surfing the net for software engineering notes. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Jill Slay, Benjamin P. Turnbull Computer Security Education and Research in Australia. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski Detecting Stealth Software with Strider GhostBuster. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky Honeypot Forensics Part I: Analyzing the Network. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF blackhat, honeypots, honeynets
17Brian D. Carrier, Blake Matheny Methods for Cluster-Based Incident Detection. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #108 of 108 (100 per page; Change: )
Pages: [<<][1][2]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license