共 50 条
- [31] Understanding Linux kernel vulnerabilities Journal of Computer Virology and Hacking Techniques, 2021, 17 : 265 - 278
- [35] Trusted path execution for the Linux 2.6 kernel as a Linux Security Module USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX TRACK 2004 USENIX ANNUAL TECHNICAL CONFERENCE, 2004, : 73 - 80
- [36] USB Security Camera Software for Linux 2ND INTERNATIONAL SCIENCE, SOCIAL SCIENCE, ENGINEERING AND ENERGY CONFERENCE 2010 (I-SEEC 2010), 2011, 8 : 171 - 176
- [37] Quantifying the Security Profile of Linux Applications PROCEEDINGS OF THE 14TH ACM SIGOPS ASIA-PACIFIC WORKSHOP ON SYSTEMS, APSYS 2023, 2023, : 80 - 86
- [38] Security Analysis of Access Linux Platform INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (05): : 12 - 18
- [39] The Study of Access Mechanism for the Security of Linux INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS RESEARCH, 2013, 422 : 176 - 180
- [40] Encrypted watermarks and Linux laptop security INFORMATION SECURITY APPLICATIONS, 2005, 3325 : 27 - 38