… A VMM-basedintrusionpreventionsystem in cloud computing environment[J]. The Journal of Supercomputing , 2013, 66 (3) : 1133–1151 DOI:10.1007/s11227-011-0608-2 …
… The model began with the principle of intrusionprevention with access to behavioral … IntrusionPreventionSystem, NIPS),基于主机的入侵防御系统(Host IntrusionPreventionSystem…
… of the securitydetection method … : a VMM⁃based platform to detect hidden process by multi⁃view compari⁃ son[C]/ /13th IEEE International Symposium on High⁃ Assurance Systems …
… community, and plays an important role in intrusiondetection, kernel integrity protection and many other areas. … Using VMM-based sensors to monitor honeypots. In: Boehm H, ed. Proc. …
… Towards a VMM-based usage control framework for OS kernel integrity protection[A]. Proceedings of the 12th ACM Symposium on Access Control Models and Technologies[C]. Sophia …
… used in areas such as intrusiondetection and malware analysis. … detection through VMM-based “out-of-the-box” semantic view reconstruction[A]. Computer and Communication Security…