Sciweavers

6689 search results - page 94 / 1338
» A Network Security Monitor
Sort
View
IC
2004
13 years 10 months ago
Performance Monitoring on Networked Virtual Environments
As networked virtual environments gain increasing interest and acceptance in the field of Internet applications, a lot of effort is drawn in the optimization of their performance, ...
Christos Bouras, Eri Giannaka
VMCAI
2010
Springer
14 years 6 months ago
Model-Checking In-Lined Reference Monitors
Abstract. A technique for elegantly expressing In-lined Reference Monitor (IRM) certification as model-checking is presented and implemented. In-lined Reference Monitors (IRM'...
Meera Sridhar, Kevin W. Hamlen
DMS
2010
147views Multimedia» more  DMS 2010»
13 years 7 months ago
Towards Security-aware Program Visualization for Analyzing In-lined Reference Monitors
In-lined Reference Monitoring frameworks are an emerging technology for enforcing security policies over untrusted, mobile, binary code. However, formulating correct policy specifi...
Aditi Patwardhan, Kevin W. Hamlen, Kendra Cooper
CCS
2009
ACM
14 years 3 months ago
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
Yao Liu, Michael K. Reiter, Peng Ning
ISI
2003
Springer
14 years 2 months ago
Active Database Systems for Monitoring and Surveillance
In many intelligence and security tasks it is necessary to monitor data in database in order to detect certain events or changes. Currently, database systems offer triggers to pro...
Antonio Badia