Title
Introspecting for RSA Key Material to Assist Intrusion Detection.
Abstract
Although the deployment of TLS has been of great importance to its users in preventing eavesdroppers from reading personal data, it also prevents intrusion detection systems (IDSs) from completing their own tasks, as they are, in essence, eavesdroppers themselves. Cloud providers specifically are at risk because of the pure mass of data they accrue over the many applications they serve, so they ha...
Year
DOI
Venue
2015
10.1109/MCC.2015.100
IEEE Cloud Computing
Keywords
Field
DocType
Cloud computing,Virtual machining,Ciphers,Operating systems,Forensics,Random access memory
Virtual machine introspection,Software deployment,Virtual machine,Temporal isolation among virtual machines,Computer security,Computer science,Intrusion detection system,Public-key cryptography,Cloud computing,The Internet
Journal
Volume
Issue
ISSN
2
5
2325-6095
Citations 
PageRank 
References 
1
0.37
7
Authors
3
Name
Order
Citations
PageRank
John T. Saxon131.13
Behzad Bordbar271452.94
Keith Harrison3171.56