编辑:sx_chengl
2016-10-08
参考文献的合理引用不仅体现出是作者严谨的学术精神,还是评价论文学术水平的重要依据,本文是一篇软件工程毕业论文参考文献,接下来让我们一起来看看吧~
[1]Biun,A.Virtualizationtechniques:AmethodicalreviewofXenandKVM[A]-CommunicationinComputerandInformationScience[C],2011:399-410
[2]SupermanJ,VenkitachalamG,LimB.VirtualizationI/ODevicesonVMWareWorkstationHostedVirtualMachineMonitor[A].In:Proceedingofthe2001USENIXAnnualTechnicalConference(USENIXATC2001)[C]5Boston,MA,USA,2001:16-30.
[3]Quynh?NguyenAnh.Areal-timeintegritymonitorforXenvirtualmachine[A].InternationalConferenceonNetworidngandServices2006:110-123.
[4]Fernandes,NataliaCastro>eto.XNetMon:Anetworkmonitorforseemingvirtualnetworks[A].IEEEInternationalConferenceonCommunication[C].2011:351-356.
[5]PayneB,CarboneM,SharifMbaxges:anarchitectureforsecureactivemonitoringusingvirtualization[A],In:ProceedingoftheIEEESymposiumonSecurityaridPrivacy,IEEEComputerSociety[Cj.Washington,DC,USA,2008:233-247
[6]Carbone,Martim.Secureandrobustmonitoringofvirtualmachinesthroughguest-assistedintrospection[A].LectureNotesinComputerScience,2012:22-4L
[7]Ibrahim,AmaniS.CloudSec:AsecuritymonitoringapplianceforHirtualMachinesinthelaascloudmodel[A].InternationalConferenceonNetworkandSystemSecurity[C]-2011:113-120.
[8]GuofbXiang,HaiJin,DeqingZou.AComprehensiveMonitoringFrameworkforVirtualtfiComputingEnvironment[A].In:Proaofthe26InternationalConferenceonInformationNetworking(IC01N2012)[C],poster,Bali,Indonesia,2012:551-556.
[9]Vmitoolsprojecthomepage.2012.Available:
[10]Payne,BryanD.Secureandflexiblemonitoringofvirtualmachines[A].AnnualComputerSecurityApplicationsConference,ACSAC[C].2007:385-397.
[11]K.Lawton,B.Denney,N.D.Guarneri,V.Ruppert,C.Bothamy.Bochsx86PCEmulatorUserManual[EB/OL].
[12]ChandraShekar,N.Fornesic.AnalysisonQUME[A].CommunicationsinComputerandInformationScience[C],2011,250:777-781.
[13]SharifM,LeeW,CuiW,LanziA.SecureinVMmonitoringusinghardwarevirtualization[A],In:Proc.ofthe16*ACMConfonComputerandCommunicationsSecurity[C].NewYork:ACMPress,2009:477-487.
[14]GarfinkelT,RosenblumM.Avirtualmachineintrospectionbasedarchitectureforintrusiondetection[A],In:Proc.ofthe10thNetworkandDistributedSystemSecuritySymp[C].Berkeley:USENIXAssociation,2003:191-206.
[15]Barham,Paul.Xenandtheartofvirtualization[A].OperatingSystemReview(ACM)[C].2003,275.:164-177.
[16]P.Barham,B,Dragovic,K.Franser,S.Hand,T.Harris,A.Ho,R.Neugebauer,I.Pratt,andA.Warfiele.Xenandtheartofvirtualization[A].ACMsymposiumonOperatingSystemsPrinciples(SISP19)[C]92003:164-180.
[17]A.SrivastavaandV.Ganapathy.TowardsaRicherModelofCloudAppMarkets[A].ACMCCSCloudComputingSecurityWorkshop(CCSW'12)[C],2012:101-114.
[19]项国富,金海,邹德清,陈学.基于虚拟化的安全监控[J].软件学报,2012.
[20]项国富.虚拟计算环境的安全监控技术研究[DI,华中科技大学,2009.
[21]Bayer,Ulrich,etal.A^ewoncurrentmalwarebehaviors[A].USENIXworkshoponlaige-scaleexploitsandemergentthreats(LEET)[C].2009:189-203.
[22]曲文涛,李明禄,翁楚良,跨虚拟机的可信检测[J],计算机科学与_索.2010-2.
[23]BryanD.PayenMartimD.P.deA.CarboneWenkeLee.SecureandFlexibleMonitoringofVirtualMachines[A],ComputerSecurityApplicationsConference[C].2007:385-397.
[24]GeraldJ.PopekandRobertP.C^dberg.Formalrequirementsforvirtualizablethird‘generationarchitectures[A].CommunicationsoftheACM[C],17,July1974
[25]李狗.一个基于硬件虚拟化的内核完整性监控方法[J].计算机科学,2011,38,(12>68-72.
[26]BovetDP,CesatiM.UnderstandingtheLinuxKernel[M](3rdEdition)?Sebastopol:O'ReillyMediaPress,2006:75-123.57
[27]A.SomayajiandS.Forrest.AutomatedResponseUsingSystem-CallDelays[A].InProceedingofthe9thUSENIXSecuritySymposium[C],2000:185-198.
[28]宋宝华.Linux设备驱动开发详解[M].第二版.北京:人民邮电出版社,2010,11.245-317.
[29]WolfgangMauerer.深入Linux内核架构[M].第一版.北京:人民邮电出版社,2010.06.413-449.
[30]Virusandthreatsdescriptions.Rootkit[Z].Win32.Fu.
好了,这篇软件工程毕业论文参考文献的精彩内容就给大家介绍到这里了。希望大家继续关注我们的网站!
相关推荐:
标签:参考文献
精品学习网(51edu.com)在建设过程中引用了互联网上的一些信息资源并对有明确来源的信息注明了出处,版权归原作者及原网站所有,如果您对本站信息资源版权的归属问题存有异议,请您致信qinquan#51edu.com(将#换成@),我们会立即做出答复并及时解决。如果您认为本站有侵犯您权益的行为,请通知我们,我们一定根据实际情况及时处理。