Cited By
View all- Bhat WQuadri SSadeghi AGligor VYung M(2013)POSTER: Dr. Watson provides data for post-breach analysisProceedings of the 2013 ACM SIGSAC conference on Computer & communications security10.1145/2508859.2512522(1445-1448)Online publication date: 4-Nov-2013
- Ansari MChattopadhayay ADas S(2010)A Kernel Level VFS Logger for Building Efficient File System Intrusion Detection SystemProceedings of the 2010 Second International Conference on Computer and Network Technology10.1109/ICCNT.2010.47(273-279)Online publication date: 23-Apr-2010