Zobrazeno 1 - 2
of 2
pro vyhledávání: '"Schade, C.L."'
Publikováno v:
Proceedings of the 25th Large Installation System Administration Conference (LISA 2011), 201-216
STARTPAGE=201;ENDPAGE=216;TITLE=Proceedings of the 25th Large Installation System Administration Conference (LISA 2011)
Proceedings of the 25th Large Installation System Administration Conference (LISA 2011, Boston MA, USA, December 4-9, 2011), 201-215
STARTPAGE=201;ENDPAGE=215;TITLE=Proceedings of the 25th Large Installation System Administration Conference (LISA 2011, Boston MA, USA, December 4-9, 2011)
STARTPAGE=201;ENDPAGE=216;TITLE=Proceedings of the 25th Large Installation System Administration Conference (LISA 2011)
Proceedings of the 25th Large Installation System Administration Conference (LISA 2011, Boston MA, USA, December 4-9, 2011), 201-215
STARTPAGE=201;ENDPAGE=215;TITLE=Proceedings of the 25th Large Installation System Administration Conference (LISA 2011, Boston MA, USA, December 4-9, 2011)
Avatar is a new architecture devised to perform on-the-¿y malware analysis and containment on ordinary hosts; that is, on hosts with no special setup. The idea behind Avatar is to inject the suspected malware with a specially crafted piece of softwa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::314f2f3b3559937e3caf362331503fe8
https://research.utwente.nl/en/publications/edf02c85-d02a-431e-ab89-1be5298ffa71
https://research.utwente.nl/en/publications/edf02c85-d02a-431e-ab89-1be5298ffa71
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.