Sciweavers

56 search results - page 9 / 12
» A framework for malicious workload generation
Sort
View
CCS
2009
ACM
14 years 7 months ago
Automatic discovery of botnet communities on large-scale communication networks
Botnets are networks of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. Recognized as one ...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
ACSAC
2002
IEEE
13 years 12 months ago
Enforcing Resource Bound Safety for Mobile SNMP Agents
The integration of mobile agents with SNMP creates significant advantages for the management of complex networks. Nevertheless, the security concerns of mobile agent technology l...
Weijiang Yu, Aloysius K. Mok
SIGMOD
2006
ACM
170views Database» more  SIGMOD 2006»
14 years 7 months ago
COLT: continuous on-line tuning
Self-tuning is a cost-effective and elegant solution to the important problem of configuring a database to the characteristics of the query load. Existing techniques operate in an...
Karl Schnaitter, Serge Abiteboul, Tova Milo, Neokl...
ASPLOS
2012
ACM
12 years 2 months ago
Comprehensive kernel instrumentation via dynamic binary translation
Dynamic binary translation (DBT) is a powerful technique that enables fine-grained monitoring and manipulation of an existing program binary. At the user level, it has been emplo...
Peter Feiner, Angela Demke Brown, Ashvin Goel
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
14 years 8 months ago
UNIT: User-centric Transaction Management in Web-Database Systems
Web-database systems are nowadays an integral part of everybody's life, with applications ranging from monitoring/trading stock portfolios, to personalized blog aggregation a...
Alexandros Labrinidis, Daniel Mossé, Huimin...