Version 4 (modified by 15 years ago) ( diff ) | ,
---|
Academic Papers
- P. Doyle, M. Deegan, C. O’Driscoll, M. Gleeson, B. Gillespie:
Ubiquitous Desktops with Multi-factor Authentication.
In Proceedings of the Third International Conference on Digital Information Management (ICDIM 2008), London, United Kingdom, November 2008.
- D. Cavalca, E. Goldoni:
HIVE: an Open Infrastructure for Malware Collection and Analysis.
In Proceedings of the 1st Workshop on Open Source Software for Computer and Network Forensics (ossconf08), Milan, Italy, September 2008.
- R. Riley, X. Jiang, D. Xu:
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing.
In Recent Advances in Intrusion Detection, LNCS 5230, Springer Berlin / Heidelberg, September 2008.
- A. Wolbach, J. Harkes, S. Chellappa, M. Satyanarayanan:
Transient Customization of Mobile Computing Infrastructure.
Technical Report CMU-CS-08-117, School of Computer Science, Carnegie Mellon University, April 2008.
- F. Camargos, G. Girard:
Virtualization of Linux servers.
In Proceedings of the Linux Symposium 2008, Ottawa, Ontario, Canada, July 2008.
- T. Werner:
VirtualBox im auswärtigen Amt. (Case study, slides in German)
Presented at Frühjahrsfachgespräch 2008 of the German Unix User Group, Munich, Germany, March 2008.
Note:
See TracWiki
for help on using the wiki.