{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:37:19Z","timestamp":1725457039376},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/milcom.2011.6127643","type":"proceedings-article","created":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T16:34:31Z","timestamp":1330619671000},"page":"2176-2181","source":"Crossref","is-referenced-by-count":3,"title":["Increasing attacker workload with virtual machines"],"prefix":"10.1109","author":[{"given":"Stephen","family":"Kuhn","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Taylor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1147\/rd.255.0483"},{"journal-title":"Round Robin DNS Load Balancing","year":"2004","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/CMPCON.1979.729112"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1794"},{"year":"0","key":"16"},{"key":"13","first-page":"19","author":"snoeren","year":"2001","journal-title":"Fine-grained Failover Using Connection Migration"},{"journal-title":"Failover Configuration for LocalDirector","year":"0","key":"14"},{"key":"11","first-page":"54","author":"tan","year":"2002","journal-title":"Undermining An Anomaly-based Intrusion Detection System Using Common Exploits"},{"key":"12","first-page":"126","author":"deering","year":"1994","journal-title":"An Architecture for Wide-area Multicast Routing"},{"year":"0","key":"21"},{"journal-title":"VMware and CPU Virtualization","year":"0","author":"lo","key":"20"},{"year":"0","key":"22"},{"key":"23","first-page":"441","author":"nguyen","year":"0","journal-title":"Computer Security Applications Conference 2009 ACSAC '09 Annual Title= MAVMM Lightweight and Purpose Built VMM for Malware Analysis 2009"},{"journal-title":"On-demand Virtual Work System","year":"0","author":"wang","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.324"},{"journal-title":"The Virtualization API","year":"2010","key":"26"},{"journal-title":"DNS and Bind","year":"2006","author":"liu","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2136"},{"journal-title":"FUSE File System in User Space","year":"0","key":"29"},{"journal-title":"Web Security \\& Commerce","year":"1997","author":"garfinkel","key":"3"},{"key":"2","first-page":"800","author":"scarfone","year":"2007","journal-title":"Guide to intrusion detection and prevention systems (IDPS)"},{"journal-title":"Barracuda Web Application Firewall - Web Application Protection Against Hackers and Vulnerabilities","year":"2010","key":"10"},{"journal-title":"The Top Cyber Security Risks","year":"0","author":"dhamankar","key":"1"},{"journal-title":"Anti-rootkit | Free Rootkit Removal | Rootkit Detection - Sophos","year":"2010","key":"7"},{"key":"6","first-page":"276","author":"quynh","year":"2007","journal-title":"Towards A Tamper-resistant Kernel Rootkit Detector"},{"journal-title":"Norton Security - Antivirus Software | Norton Store","year":"2010","key":"5"},{"journal-title":"McAfee - Antivirus Encryption DLP IPS Firewall Email Security Web Security SaaS Risk and Compliance Solutions","year":"2010","key":"4"},{"key":"9","first-page":"67","author":"desmet","year":"2006","journal-title":"Bridging the Gap between Web Application Firewalls and Web Applications"},{"journal-title":"RootkitRevealer","year":"2010","key":"8"}],"event":{"name":"MILCOM 2011 - 2011 IEEE Military Communications Conference","start":{"date-parts":[[2011,11,7]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2011,11,10]]}},"container-title":["2011 - MILCOM 2011 Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6111660\/6127424\/06127643.pdf?arnumber=6127643","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T16:40:57Z","timestamp":1490114457000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6127643\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/milcom.2011.6127643","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}