{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T17:41:08Z","timestamp":1648662068754},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2007,10,1]],"date-time":"2007-10-01T00:00:00Z","timestamp":1191196800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2007,10]]},"DOI":"10.1007\/s11623-007-0241-7","type":"journal-article","created":{"date-parts":[[2007,10,25]],"date-time":"2007-10-25T18:17:48Z","timestamp":1193336268000},"page":"740-743","source":"Crossref","is-referenced-by-count":0,"title":["Vertrauensw\u00fcrdige Protokollierung"],"prefix":"10.1007","volume":"31","author":[{"given":"Stephen D.","family":"Wolthusen","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"241_CR1","first-page":"56","volume":"49","author":"B. Carrier","year":"2006","unstructured":"Carrier, B. Risks of Live Digital Forensic Analysis Communications of the ACM 49(2), 56\u201361 (2006).","journal-title":"Risks of Live Digital Forensic Analysis Communications of the ACM"},{"key":"241_CR2","unstructured":"Chung, S.P., Mok, A. On Random Inspection Based Intrusion Detection. In Proceedings of the 8 th International Symposium on Recent Advances in Intrusion Detection (Seattle, WA, USA, Sep. 2005), Springer-Verlag, pp. 165\u2013184."},{"key":"241_CR3","unstructured":"Anderson, E.III A Demonstration of the Subversion Threat: Facing a Critical Responsibility in the Defense of Cyberspace. M.Sc. Dissertation, U.S. Naval Postgraduate School (Monterey, CA, USA, 2002)."},{"key":"241_CR4","volume-title":"Causality: Models, Reasoning, and Inference","author":"J. Pearl","year":"2000","unstructured":"Pearl, J. Causality: Models, Reasoning, and Inference. Cambridge University Press, Cambridge, UK, 2000."},{"key":"241_CR5","volume-title":"Probabilistic Reasoning in Intelligent Systems","author":"J. Pearl","year":"1988","unstructured":"Pearl, J. Probabilistic Reasoning in Intelligent Systems. Morgan Kaufman Publishers, San Francisco, CA, USA, 1988."},{"key":"241_CR6","unstructured":"Myers, P.A.. Subversion: The Neglected Aspect of Computer Security. M.Sc. Dissertation, U.S. Naval Postgraduate School (Monterey, CA, USA, 1980)."},{"key":"241_CR7","volume-title":"Rootkits","author":"G. Hoglund","year":"2005","unstructured":"Hoglund, G. and Butler, J. Rootkits. Addison-Wesley, Reading, MA, USA, 2005."},{"key":"241_CR8","unstructured":"Rutkowska, J. Thoughts about Crossview Based Rootkit Detection. Unver\u00f6ffentlichtes Memorandum (2005)."},{"key":"241_CR9","volume-title":"The Art of Computer Virus Research and Defense","author":"P. Szor","year":"2005","unstructured":"Szor, P. The Art of Computer Virus Research and Defense. Addison-Wesley, Reading, MA, USA, 2005."},{"key":"241_CR10","volume-title":"Vortrag anl\u00e4\u00dflich der Black Hat-Tagung","author":"J. Heasman","year":"2005","unstructured":"Heasman, J. Implementing and Detecting an ACPI BIOS Root Kit. Vortrag anl\u00e4\u00dflich der Black Hat-Tagung (Las Vegas, NV, USA, 2005)."},{"key":"241_CR11","unstructured":"Grizzard, J. and Owen, H.L.. On a \u03bc-Kernel Based System Architecture Enabling Recovery from Rootkits. In Proceedings of the First IEEE International Workshop on Critical Infrastructure Protection (Darmstadt, Germany, Nov. 2005), IEEE Press, pp. 13\u201321."},{"key":"241_CR12","unstructured":"Levine, J., Grizzard, J. and Owen, H.L.. A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. In Proceedings of the Second IEEE International Workshop on Information Assurance (Charlotte, NC, USA, Apr. 2004), IEEE Press, pp. 107\u2013128."},{"key":"241_CR13","unstructured":"Kruegel, C., Robertson, W., and Vigna, G.. Detecting Kernel-Level Rootkits Through Binary Audits. In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004) (Tucson, AZ, USA, Dec. 2004), IEEE Press, pp. 91\u2013100."},{"key":"241_CR14","unstructured":"Uppuluri, P. and Sekar, R. On Random Inspection Based Intrusion Detection. In Proceedings of the 4 th International Symposium on Recent Advances in Intrusion Detection (Davis, CA, USA, Oct. 2001), Springer-Verlag, pp. 172\u2013189."},{"key":"241_CR15","doi-asserted-by":"crossref","unstructured":"King, S.T., Chen, P.M., Wang, Y.-M., Verbowski, C., Wang, H.J., and Lorch, J.R. SubVirt: Implementing Malware with Virtual Machines. In Proceedings of the 2006 IEEE Symposium on Security and Privacy (Oakland, CA, USA, May 2006), IEEE Press, pp. 314\u2013327.","DOI":"10.1109\/SP.2006.38"},{"key":"241_CR16","unstructured":"Wang, Y.-M., Beck, D., Vo, B., Roussev, R. and Verbowski, C. Detecting Stealth Software with Strider Ghostbuster. In Proceedings of the 2005 International Conference on Dependable Systems and Networks (Oakland, CA, USA, May 2006), IEEE Press, pp. 368\u2013377."},{"key":"241_CR17","volume-title":"Concurrent Non-Deterministic Monitoring of Operating System Kernel Properties","author":"T.R. McEvoy","year":"2007","unstructured":"McEvoy T.R. and Wolthusen, S. Concurrent Non-Deterministic Monitoring of Operating System Kernel Properties. Technischer Bericht, Information Security Group, Department of Mathematics, Royal Holloway, University of London, UK (2007)."},{"key":"241_CR18","doi-asserted-by":"crossref","DOI":"10.1007\/b13246","volume-title":"Composition of Secure Multi-Party Protocols: A Comprehensive Study","author":"Y. Lindell","year":"2003","unstructured":"Lindell, Y. Composition of Secure Multi-Party Protocols: A Comprehensive Study. Springer-Verlag, Berlin, 2003."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0241-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-007-0241-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0241-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:08:26Z","timestamp":1559412506000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-007-0241-7"}},"subtitle":["Protokollierung mittels nicht-deterministischer nebenl\u00e4ufiger wechselseitiger \u00dcberwachung"],"short-title":[],"issued":{"date-parts":[[2007,10]]},"references-count":18,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2007,10]]}},"alternative-id":["241"],"URL":"https:\/\/doi.org\/10.1007\/s11623-007-0241-7","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,10]]}}}