Article,

Protecting host-based intrusion detectors through virtual machines.

, , and .
Comput. Networks, 51 (5): 1275-1283 (2007)

Meta data

Tags

Users

  • @dblp
  • @cwillems

Comments and Reviews