{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:17Z","timestamp":1738777217432,"version":"3.37.0"},"reference-count":18,"publisher":"Academy Publisher","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.8.6.1380-1386","type":"journal-article","created":{"date-parts":[[2013,6,17]],"date-time":"2013-06-17T16:04:37Z","timestamp":1371485077000},"source":"Crossref","is-referenced-by-count":0,"title":["Process-based Security Detection Approach for Virtual Machines on Private Cloud Platforms"],"prefix":"10.4304","volume":"8","author":[{"given":"Lijun","family":"Cao","sequence":"first","affiliation":[]},{"given":"Xiyin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Min","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Han","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2013,6,15]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.5071532"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1556154.1556173"},{"key":"ref3","first-page":"1113","article-title":"Secure virtualization for cloud computing.","author":"Lombardi","year":"2010","unstructured":"[4] Flavio Lombardi, Roberto DiPietro. Secure virtualization for cloud computing. Journal of Network and Computer Applications. 2010. pp. 1113-1122.","journal-title":"J Netw Comput Appl","ISSN":"https:\/\/id.crossref.org\/issn\/1084-8045","issn-type":"print"},{"issue":"8","key":"ref4","first-page":"133","article-title":"Chen xiongqun. Windows rootkit detection method based on cross-view.","volume":"36","author":"Guangdong","year":"2009","unstructured":"[11] Bai Guangdong, Guo Yao, Chen xiongqun. Windows rootkit detection method based on cross-view. Computer Science, 2009, 36(8): 133-137.","journal-title":"Computer Science"},{"issue":"No. 2","key":"ref5","first-page":"365","article-title":"Yinghua Xue, Hongpeng Liu, Intelligent Storage and Retrieval Systems Based on RFID and Vision in Automated Warehouse.","volume":"7","year":"2012","unstructured":"[16] Yinghua Xue, Hongpeng Liu, Intelligent Storage and Retrieval Systems Based on RFID and Vision in Automated Warehouse. Journal of Networks, Vol. 7, No. 2 (2012), pp: 365-369","journal-title":"Journal of Networks"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.8.1.165-173"},{"key":"ref6","doi-asserted-by":"crossref","unstructured":"[3] Enisa. Cloud computing risk assessment. 2009. http:\/\/www.enisa.europa.eu\/act\/rm\/files\/ deliverables.","DOI":"10.4304\/jnw.8.1.165-173"},{"key":"ref6","doi-asserted-by":"crossref","unstructured":"[5] Mondol, J.-A.M. Cloud security solutions using FPGA. In Communications, Computers and Signal Processing (PacRim), 2011 IEEE Pacific Rim Conference on, 2011, pp. 747-752.","DOI":"10.4304\/jnw.8.1.165-173"},{"key":"ref6","doi-asserted-by":"crossref","unstructured":"[6] Stephen T. Jones, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. Antfarm: Tracking Processes in a Virtual Machine Environment, Proc of Annual USENIX Technical Conf. Berkeley, CA: USENIX.2008.pp.1-14.","DOI":"10.4304\/jnw.8.1.165-173"},{"key":"ref6","doi-asserted-by":"crossref","unstructured":"[7] Bryan D. Payne, Martim D. P. de A. Carbone, Wenke Lee. Secure and Flexible Monitoring of Virtual Machines, proc of 23rd Annual Computer Security Applications Conf (ACSAC 07). Piscataway, NJ, 2007, pp.385-397.","DOI":"10.4304\/jnw.8.1.165-173"},{"key":"ref6","doi-asserted-by":"crossref","unstructured":"[8] Xuxian Jiang, Xinyuan Wang, Dongyan Xu. Stealthy malware detection through vmm-based \"out-of-the-box\" semantic view reconstruction[C]. Proc of the 14th ACM Conf on Computer and Communication Security (CCS 07). New York: ACM.2007.pp.128-138.","DOI":"10.4304\/jnw.8.1.165-173"},{"key":"ref6","doi-asserted-by":"crossref","unstructured":"[9] Silberman P, et al. FUTo uninformed. http:\/\/uniformed.Org\/?v=3&a=7&t=sumry.","DOI":"10.4304\/jnw.8.1.165-173"},{"key":"ref6","doi-asserted-by":"crossref","unstructured":"[10] ELF Infector. http:\/\/www.linuxforum.net\/forum\/showflat.php?Cat=&Board=security&Number=531289&page=0&view=collapsed&sb= 5&fpart=.","DOI":"10.4304\/jnw.8.1.165-173"},{"key":"ref6","doi-asserted-by":"crossref","unstructured":"[12] Microsoft. Windows Malicious Software Removal Tool. http:\/\/www.microsoft.corn\/seeurity\/malwareremoge\/.","DOI":"10.4304\/jnw.8.1.165-173"},{"key":"ref6","doi-asserted-by":"crossref","unstructured":"[13] The adore-ng Rootkit. http:\/\/stealth.openwall.net\/rootkits\/.","DOI":"10.4304\/jnw.8.1.165-173"},{"key":"ref6","doi-asserted-by":"crossref","unstructured":"[14] Wang Lina, Gao Hanjn, Liuwei, Peng yang. Detection and management of virtual machine monitor. Research and development process of Computer, 2011, pp: 1534-1541.","DOI":"10.4304\/jnw.8.1.165-173"},{"key":"ref6","doi-asserted-by":"crossref","unstructured":"[15] Rising computer virus statistics. http:\/\/www.rising.com.cn\/2007\/annual\/index.htm","DOI":"10.4304\/jnw.8.1.165-173"},{"key":"ref6","doi-asserted-by":"crossref","unstructured":"[18] Huan Zhao, Kai Zhao, He Liu, Fei Yu, Improved MFCC Feature Extraction Combining Symmetric ICA Algorithm for Robust Speech Recognition, Journal of multimedia, Vol. 7, No. 1, 2012. pp: 74-81.","DOI":"10.4304\/jnw.8.1.165-173"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:02:12Z","timestamp":1738774932000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,15]]},"references-count":18,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2013,6,15]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.8.6.1380-1386","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2013,6,15]]}}}