IOTA 发表于 2025-4-1 05:17:13

http://reply.papertrans.cn/47/4653/465263/465263_61.png

凝乳 发表于 2025-4-1 09:45:32

http://reply.papertrans.cn/47/4653/465263/465263_62.png

陈列 发表于 2025-4-1 10:58:29

http://reply.papertrans.cn/47/4653/465263/465263_63.png

Mucosa 发表于 2025-4-1 16:18:37

Investigating the Hooking Behavior: A Page-Level Memory Monitoring Method for Live ForensicsConsidering live forensic cases, we apply this method to a novel lightweight hypervisor which can build up a virtualization environment on-the-fly. Without modifying any code in target OS and suspending it, this method can monitor systems running on bare hardware. Its memory usage and performance im

aerial 发表于 2025-4-1 21:52:09

http://reply.papertrans.cn/47/4653/465263/465263_65.png
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Information Security; 17th International C Sherman S. M. Chow,Jan Camenisch,Siu Ming Yiu Conference proceedings 2014 Springer International