期刊文献+

硬件

下载PDF
导出
摘要 吉林·郑晓松:我的声卡是帝盟5100,我想用Windows2000操作系统.可是帝盟声卡已经停产了,没有Windows2000的驱动程序,不知可不可以用别的声卡的驱动程序来代替?如果可以要用什么声卡的驱动程序来代替?
出处 《电脑知识与技术(经验技巧)》 2007年第5期93-93,共1页 Computer Knowledge and Technology
  • 相关文献

参考文献5

二级参考文献36

  • 1Aleph One.Phrack 49 Volume Seven[EB/OL].Smashing The Stack For Fun And Profit.http://www.phrack.com.
  • 2Kyung suk Lhee,Steve J Chapin.Type-assisted dynamic buffer overflow detection[C].In: Proc USENIX Security Symposium, 2002 : 81 -88.
  • 3Kumar Avijit,Prateek Gupta,Deepak Gupta.TIED,LibsafePlus:Tools for Runtime Buffer Overflow Protection.http:// www.cse.iitk.ac.irdusers/ avijitk/documents/tied-libsafeplus.pdf, 2004.
  • 4Crispin Cowan, Steve Beattie, John Johansen et al.Pointguard : Protecting pointers from buffer overflow vulnerabilities[C].In:Proc USENIX Security Symposium, 2003.
  • 5Arash Baratloo, Navjot Singh, Timothy Tsai.Transparent Run-Time Defense Against Stack Smashing Attacks[C].In:Pmceedings of 2000 USENIX Annual Technical Conference San Diego,California,USA, 2000.
  • 6D Wagner,D Dean.Intrusion Detection via Static Analysis[J].IEEE Symposium on Security and Privacy,Oakland,CA,2001:156-169.
  • 7D Wagner,P Soto.Mimicry Attacks on Host-Based Intrusion Detection Systems[C].In:ACM Conference on Computer and Communications Security, 2002.
  • 8R Sekar,M Bendre,P Bollineni et al.A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors[C].In:IEEE Symposium on Security and Privacy,Oakland,CA,2001.
  • 9Henry Hanping Feng,Oleg M Kolesnikov,Prahlad Fogla et al. Anomaly Detection Using Call Stack Information.http://www-unix.ecs. umass.edu/~gong/papers/ok_idpc.pdf, 2003.
  • 10Mark Foster,Joseph N Wilson,Shigang Chen.Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks.http://www.cise. ufl.edu/~sgcherd papers/GHCP%20Paper%20Final.pdf, 2004.

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部