Sciweavers

6689 search results - page 95 / 1338
» A Network Security Monitor
Sort
View
IV
2002
IEEE
114views Visualization» more  IV 2002»
14 years 1 months ago
Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs
Computer security breaches are already a major problem in using computers. The most basic defense against it is to monitor and audit the computer logs. Computer logs, however, hav...
Tetsuji Takada, Hideki Koike
PET
2012
Springer
11 years 11 months ago
Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams
We consider applications scenarios where an untrusted aggregator wishes to continually monitor the heavy-hitters across a set of distributed streams. Since each stream can contain ...
T.-H. Hubert Chan, Mingfei Li, Elaine Shi, Wenchan...
HPCA
2007
IEEE
14 years 9 months ago
Concurrent Direct Network Access for Virtual Machine Monitors
This paper presents hardware and software mechanisms to enable concurrent direct network access (CDNA) by operating systems running within a virtual machine monitor. In a conventi...
Jeffrey Shafer, David Carr, Aravind Menon, Scott R...
MIDDLEWARE
2004
Springer
14 years 2 months ago
Monitoring the connectivity of a grid
Grid computing is a new paradigm that enables the distributed coordination of resources and services which are geographically dispersed, span multiple trust domains and are hetero...
Sergio Andreozzi, Augusto Ciuffoletti, Antonia Ghi...
CNSM
2010
13 years 16 days ago
Towards non-expert users monitoring networks and services through semantically enhanced visualizations
— Managing networks and services in large virtual enterprises often requires significant expertise to decipher and reconcile information coming from several heterogeneous sources...
Owen Conlan, John Keeney, Cormac Hampson, Fion&aac...