参考文献
|
-
Dr.Web Live, available at http://live.drweb.com/
-
Lyon G., Zenmap 5.5.1 Network Monitoring tool, available at
-
International Organization for Standardization, “Information Technology-- Security techniques-- Information security risk management (ISO/IEC 27005) ”, 2008.
-
ISO, “Information Technology - Guidelines for the Management of IT Security - Part 3: Techniques for the Management of IT Security (ISO/IEC TR 13355-3)” , 1997..
-
ISO, “Information technology - Security Techniques Information Security Management Systems - Requirement. (ISO/IEC 27001)”, 2005..
-
Oberheide J, “Exploiting Live Virtual Machine Migration”, available at http://jon.oberheide.org/files/blackhat08-migration-pres.pdf
-
賽門鐵克,北市殭屍電腦全球最「駭」城市,2010/06/01。
-
NIST, NVD (National Vulnerability Database), available at http://nvd.nist.gov/.http://nvd.nist.gov/
-
(2012).,未出版
-
General Dynamics., CSI/FBI 2010/2011 Computer Crime and Security Survey., available at http://www.docin.com/p-241701547.html
-
弱點通告:VMware多項產品發現含有可能允許執行任意程式碼或造成程式異常中斷的弱點,請儘速更新以免受駭!,2008,http://www.gsn-cert.nat.gov.tw/gsn.php?chtip=HiNet-2008-0121。
-
林信忠,雲端運算下的資安問題解密,http://www.syscom.com.tw/ePaper_Content_EPArticledetail.aspx?id=188&EPID=173&j=2&HeaderName=資安前哨站
-
IBM X-Force 2012 Cyber Security Threat Landscape, 2012 available at http://www-950.ibm.com
-
Chan, J.(2011).Virtualization: IT Audit and Security Perspectives.2011 UC Compliance & Audit Symposium
-
Clausing, J.(2009).,SANS Institute Reading Room.
-
CSA.,未出版
-
ENISA(2009).,未出版
-
Ferrie, P..,未出版
-
Hyde, D..,未出版
-
Wang, Y.T.,Chen, W.Y.(2011).ICAS: An inter-VM IDS-log Cloud Analysis System.Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference
-
Williams, B.,Cross, T.(2008).,未出版
-
倪丞頤、曾黎明(2011)。碩士論文(碩士論文)。國立中央大學資訊工程學系。
-
項國富、金海、鄒德清、陳學廣(2012)。基於虛擬化的安全監控。軟體學報,23(8),2173-2187。
|