{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:47:02Z","timestamp":1729612022369,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/icitst.2014.7038788","type":"proceedings-article","created":{"date-parts":[[2015,2,17]],"date-time":"2015-02-17T19:51:14Z","timestamp":1424202674000},"page":"112-117","source":"Crossref","is-referenced-by-count":0,"title":["Secure virtualised environment"],"prefix":"10.1109","author":[{"given":"Pushpinder Kaur","family":"Chouhan","sequence":"first","affiliation":[]},{"given":"Sakir","family":"Sezer","sequence":"additional","affiliation":[]},{"given":"Yangseo","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Ikkyun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Chunghwan","family":"Jung","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"91","article-title":"Cloudav: N-version antivirus in the network cloud","author":"oberheide","year":"2008","journal-title":"Proceedings of the 17th Conference on Security Symposium Ser SS'08"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6363995"},{"key":"16","first-page":"32","article-title":"Twin clouds: Secure cloud computing with low latency","author":"bugiel","year":"2011","journal-title":"Proceedings of the 12th IFIP TC 6\/TC 11 International Conference on Communications and Multimedia Security Ser CMS'11"},{"journal-title":"Malware Forensics Field Guid for Windows Systems Digital Forensics Field Guides","year":"2012","author":"cameron h malin","key":"13"},{"key":"14","first-page":"430","article-title":"Network-based executable file extraction and analysis for malware detection","author":"kim","year":"2012","journal-title":"Proc International Conference on Security and Cryptography 2012 SECRYPT 2012"},{"journal-title":"Libvmi Introduction","year":"2012","key":"11"},{"key":"12","first-page":"1758","article-title":"Network-based executable file detection & reconstruction system for malware detection","author":"choi","year":"2007","journal-title":"2007 International Conference on Convergence Information Technology ICCIT 2007"},{"key":"3","article-title":"Towards trusted cloud computing","author":"santos","year":"2009","journal-title":"Proceedings of the 2009 Conference on Hot Topics in Cloud Computing Ser HotCloud'09"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/945461.945464"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2012.27"},{"key":"10","article-title":"Subverting the xen hypervisor","author":"wojtczuk","year":"2008","journal-title":"Proc Black Hat USA 2008"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SISW.2005.17"},{"key":"6","first-page":"191","article-title":"A virtual machine introspection based architecture for intrusion detection","author":"garfinkel","year":"2003","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"5","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1145\/844128.844148","article-title":"Revirt: Enabling intrusion analysis through virtual-machine logging and replay","volume":"36","author":"dunlap","year":"2002","journal-title":"SIGOPS Oper Syst Rev"},{"key":"4","first-page":"1333v","article-title":"An improved trusted cloud computing platform model based on daa and privacy ca scheme","volume":"13","author":"han-zhang","year":"2010","journal-title":"Computer Application and System Modeling (ICCASM) 2010 International Conference on"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/2007183.2007189"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.7.10.2397-2403"}],"event":{"name":"2014 9th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2014,12,8]]},"location":"London, United Kingdom","end":{"date-parts":[[2014,12,10]]}},"container-title":["The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7018215\/7038754\/07038788.pdf?arnumber=7038788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T05:43:58Z","timestamp":1498196638000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7038788\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icitst.2014.7038788","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}