Entry Jiang:2010:SMD from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Jiang:2010:SMD,
author = "Xuxian Jiang and Xinyuan Wang and Dongyan Xu",
title = "Stealthy malware detection and monitoring through
{VMM}-based ``out-of-the-box'' semantic view
reconstruction",
journal = j-TISSEC,
volume = "13",
number = "2",
pages = "12:1--12:??",
month = feb,
year = "2010",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/1698750.1698752",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Tue Mar 16 10:18:15 MDT 2010",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
acknowledgement = ack-nhfb,
articleno = "12",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- detection,
2(2)159,
2(3)295,
3(1)1,
3(3)186,
3(4)227,
3(4)262,
4(4)407,
5(3)203,
6(2)173,
6(4)443,
7(4)591,
9(1)61,
10(1)4,
11(2)2,
11(3)12,
11(3)15,
11(4)19,
11(4)20,
12(2)11,
12(2)12,
12(2)13,
12(4)22,
13(4)30,
14(1)13,
14(3)27,
15(2)6,
15(3)11,
15(4)17,
17(4)13,
17(4)15,
18(1)2,
18(2)7,
18(3)9
- Jiang, Xuxian,
14(3)24
- malware,
11(3)16,
16(4)13
- monitoring,
11(2)2,
12(2)13,
12(3)19,
13(4)38,
14(1)13,
15(2)10,
16(1)3,
16(2)7,
16(4)14
- semantic,
1(1)93,
10(2)8,
10(4)2,
11(4)21,
12(2)13,
12(3)14,
13(3)21,
13(4)36,
14(3)25,
15(3)13,
16(1)1,
16(2)7,
17(1)2,
17(1)3,
17(2)7
- through,
5(4)367,
6(1)1,
9(2)162,
10(3)12,
10(4)2,
10(4)6,
11(2)2,
11(3)12,
11(4)22,
11(4)23,
12(2)8,
12(2)13,
13(3)25,
14(1)13,
15(3)12,
15(4)16,
16(2)5,
16(2)7,
16(3)9,
17(4)14,
18(1)2,
18(2)7,
18(3)11