参考文献
[1]Cui W,Katz R H,Tan Waitian.Design and Implementation of an Extrusionbased Breakin Detector for Personal Computers[C]//Proceedings of the 21st Annual Computer Security Applications Conference.Washington D.C.,USA:IEEE
Press,2005:110.
[2]Gummadi R,Balakrishnan H,Maniatis P.et al.NotaBot(NAB):Improving Service Availability in the Face of Botnet Attacks[C]//Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation.New York,USA:ACM
Press,2009:207220.
[3]Gu G,Porras P,Yegneswaran V,et al.BotHunter:Detecting Malware Infection through IDSdriven Dialog Correlation[C]//Proceedings of the 16th USENIX Security Symposium.Berkeley,USA:USENIX Association,2007:1220.
[4]Gu G,Perdisci R,Zhang J,et al.BotMiner:Clustering Analysis of Network Traffic for Protocol and Structureindependent Botnet Detection[C]//Proceedings of the 17th Conference on Security Symposium.Berkeley,USA:USENIX
Association,2008:139154.
[5]Garfinkel T,Rosenblum M.A Virtual Machine Introspection based Architecture for Intrusion Detection[C]//Proceedings of Network and Distributed Systems Security Symposium.Washington D.C.,USA:IEEE Press,2003.
[6]Smith S W.Trusted Computing Platform:Design and Applications[M].Berlin,Germany:Springer,2004.
[7]刘哲元,慕德俊.安全虚拟环境中的进程执行精确监控[J].西安电子科技大学学报,2012,39(6):181186.
[8]Baliga A,Iftode L,Chen X.Automated Containment of Rootkit Attacks[J].Computer & Security,2008,27(7):323334.
[9]Payne B D,Sailer R,Perez R,et al.A Layered Approach to Simplified Access Control in Virtualized Systems[J].ACM SIGOPS Operating Systems Review,2007,41(4):1219.
[10]Wine H Q.Run Windows Applications on Linux,BSD and Mac OS X[EB/OL].[20141218].http://www.winehq.org.
[11]Squid:Optimising Web Delivery[EB/OL].[20141218].http://www.squidcac.he.org.
[12]Purcell K.Technology’s Impact on Workers[EB/OL].[20141218].http://www.pewinternet.org/files/2014/12/PI_Web25WorkTech_12.30.141.pdf.
[13]Sleator D D,Tarjan R E.Selfadjusting Binary Search Trees[J].Journal of the ACM,1985,32(3):652686.
[14]Smith R.An Overview of the Tesseract OCR Engine[C]//Proceedings of the 9th International Conference on Document Analysis and Recognition.Washington D.C.,USA:IEEE Press,2007:629633.
[15]Levenshtein V I.Binary Codes Capable of Correcting Deletions,Insertions and Reversals[J].Soviet Physics Doklady,1966,10(8):707710.
[16]Prox SMTP:An SMTP Filter[EB/OL].[20141218].http://memberwebs.com/stef/software/ proxsmtp.
[17]Resnick P.Internet Message Format[Z].2010.
[18]Freed N,Borenstein N.MIMEPart One:Format of Internet Message Bodies[Z].1996.
[19]Shneiderman B.Designing the User Interface:Strategies for Effective Humancomputer Interaction[M].Upper Saddle River,USA:AddisonWesley Professional,1998.
[20]Colp P,Matthews C,Aiello B,et al.VM Snapshots[EB/OL].[20141218].https://cwiki.apache.org/confluence/display/cloudstack/vm+snapshots.
编辑陆燕菲 |