Sciweavers

935 search results - page 125 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
VIZSEC
2004
Springer
14 years 3 months ago
Visualizing windows executable viruses using self-organizing maps
This paper concentrates on visualizing computer viruses without using virus specific signature information as a prior stage of the very important problem of detecting computer vi...
InSeon Yoo
NCA
2003
IEEE
14 years 3 months ago
Source-End DDoS Defense
A successful source-end DDoS defense enables early suppression of the attack and minimizes collateral damage. However, such an approach faces many challenges: (a) distributing the...
Jelena Mirkovic, Gregory Prier, Peter L. Reiher
OSDI
2004
ACM
14 years 10 months ago
Secure Untrusted Data Repository (SUNDR)
SUNDR is a network file system designed to store data securely on untrusted servers. SUNDR lets clients detect any attempts at unauthorized file modification by malicious server o...
David Mazières, Dennis Shasha, Jinyuan Li, ...
DSN
2006
IEEE
14 years 4 months ago
Dynamic Verification of Memory Consistency in Cache-Coherent Multithreaded Computer Architectures
—Multithreaded servers with cache-coherent shared memory are the dominant type of machines used to run critical network services and database management systems. To achieve the h...
Albert Meixner, Daniel J. Sorin
AINA
2006
IEEE
14 years 2 months ago
Towards an Unified Experimentation Framework for Protocol Engineering
The design and development process of complex systems require an adequate methodology and efficient instrumental support in order to early detect and correct anomalies in the func...
Laurent Dairaine, Ernesto Exposito, Herve Thalmens...