Last update: Thu Jun 20 02:01:00 MDT 2019
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Laureano:2007:PHB,
author = "M. Laureano and C. Maziero and E. Jamhour",
title = "Protecting host-based intrusion detectors through
virtual machines",
journal = j-COMP-NET-AMSTERDAM,
volume = "51",
number = "5",
pages = "1275--1283",
day = "11",
month = apr,
year = "2007",
CODEN = "????",
ISSN = "1389-1286 (print), 1872-7069 (electronic)",
ISSN-L = "1389-1286",
bibdate = "Sat Apr 2 08:42:17 MDT 2011",
bibsource = "http://www.math.utah.edu/pub/tex/bib/compnetamsterdam2000.bib",
acknowledgement = ack-nhfb,
fjournal = "Computer Networks",
journal-URL = "http://www.sciencedirect.com/science/journal/13891286",
}
Related entries
- intrusion,
34(4)541,
34(4)547,
34(4)579,
34(4)597,
34(4)605,
34(4)623,
34(4)641,
45(2)175,
51(4)1151,
51(5)1233,
51(5)1334,
53(14)2458
- machines,
52(2)432,
53(14)2476,
53(17)2923
- protecting,
48(5)781,
50(2)200,
51(5)1239,
51(10)2580,
51(13)3864
- through,
34(3)467,
38(2)247,
40(4)577,
45(4)537,
47(2)147,
48(2)175,
50(11)1675,
51(10)2616,
52(3)593,
52(9)1797,
52(15)2924,
52(18)3405,
53(1)45,
53(5)727
- virtual,
32(1)99,
32(6)717,
35(2)351,
36(2)137,
36(2)153,
37(2)111,
38(1)61,
38(2)165,
41(3)331,
42(6)765,
44(1)17,
44(3)319,
46(4)519,
50(8)1069,
50(15)2805,
51(7)1800,
51(14)4131,
52(3)563,
52(16)3130,
52(16)3148,
53(7)883,
53(9)1497,
53(10)1697,
53(17)2923