CORC

浏览/检索结果: 共15条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Designing and Modeling of Covert Channels in Operating Systems 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2016, 卷号: 65, 期号: 6, 页码: 1706-1719
Lin, YQ; Malik, SUR; Bilal, K; Yang, QS; Wang, YJ; Khan, SU
收藏  |  浏览/下载:17/0  |  提交时间:2016/12/09
用于内存安全监测的轻量虚拟机监控代理设计与实现 学位论文
硕士, 北京: 中国科学院研究生院, 2015
马乐乐
收藏  |  浏览/下载:21/0  |  提交时间:2015/06/26
Denial-of-service security attack in the continuous-time world 会议论文
34th IFIPWG6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, FORTE 2014 - Held as Part of the 9th International Federated Conference on Distributed Computing Techniques, DisCoTec 2014, Berlin, Germany, June 3, 2014 - June 5, 2014
Wang, Shuling (1); Nielson, Flemming (2); Nielson, Hanne Riis (2)
收藏  |  浏览/下载:22/0  |  提交时间:2014/12/16
Defending return-oriented programming based on virtualization techniques 期刊论文
Security and Communication Networks, 2013, 卷号: Volume 6, 期号: Issue 10, 页码: 1236-1249
Xiaoqi Jia; Rui Wang; Jun Jiang; Shengzhi Zhang; Peng Liu
收藏  |  浏览/下载:21/0  |  提交时间:2013/04/11
基于硬件虚拟化的软件安全沙盒技术研究 学位论文
硕士, 北京: 中国科学院大学, 2013
姜军
收藏  |  浏览/下载:19/0  |  提交时间:2013/05/22
black-box testing based on colorful taint analysis 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2012, 卷号: 55, 期号: 1, 页码: 171-183
Chen Kai; Feng DengGuo; Su PuRui; Zhang YingJun
收藏  |  浏览/下载:17/0  |  提交时间:2013/09/17
基于D-S证据理论的主机违规行为检查方法 期刊论文
Computer Applications and Software, 2012, 卷号: 29, 期号: 2, 页码: 90-93,148
王斌; 连一峰; 陈恺
收藏  |  浏览/下载:12/0  |  提交时间:2012/11/12
a multi-compositional enforcement on information flow security 会议论文
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Sun Cong; Zhai Ennan; Chen Zhong; Ma Jianfeng
收藏  |  浏览/下载:11/0  |  提交时间:2013/10/08
on the invisibility of designated confirmer signatures 会议论文
6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22,
Xia Fubiao; Wang Guilin; Xue Rui
收藏  |  浏览/下载:22/0  |  提交时间:2011/10/10
verifying the safety of xen security modules 会议论文
2011 5th International Conference on Secure Software Integration and Reliability Improvement - Companion, SSIRI-C 2011, Jeju Island, Korea, Republic of, 27-Jun-02
Han Wei; He Yeping; Ding Liping
收藏  |  浏览/下载:20/0  |  提交时间:2011/10/10


©版权所有 ©2017 CSpace - Powered by CSpace