Sciweavers

58 search results - page 7 / 12
» Detecting Insider Threats by Monitoring System Call Activity
Sort
View
DASC
2006
IEEE
13 years 11 months ago
Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring
Run-time monitoring is a powerful approach for dynamically detecting faults or malicious activity of software systems. However, there are often two obstacles to the implementation...
Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Joh...
IEEEARES
2008
IEEE
14 years 1 months ago
A Lazy Monitoring Approach for Heartbeat-Style Failure Detectors
—Failure detectors are a fundamental part of safe fault-tolerant distributed systems. Many failure detectors use heartbeats to draw conclusions about the state of nodes within a ...
Benjamin Satzger, Andreas Pietzowski, Wolfgang Tru...
ICRA
2003
IEEE
111views Robotics» more  ICRA 2003»
14 years 22 days ago
Fuzzy Petri nets for monitoring and recovery
- In this paper, we propose a unitary tool for modeling and analysis of discrete event systems monitoring. Uncertain knowledge of such tasks asks specific reasoning and adapted fuz...
Daniel I. Racoceanu, Eugenia Minca, Noureddine Zer...
ICDCS
2006
IEEE
14 years 1 months ago
SysProf: Online Distributed Behavior Diagnosis through Fine-grain System Monitoring
Runtime monitoring is key to the effective management of enterprise and high performance applications. To deal with the complex behaviors of today’s multi-tier applications runn...
Sandip Agarwala, Karsten Schwan
ICETE
2004
204views Business» more  ICETE 2004»
13 years 8 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson