Sciweavers

75 search results - page 4 / 15
» Detecting Policy Violations through Traffic Analysis
Sort
View
IPPS
2006
IEEE
14 years 3 months ago
Decentralized runtime analysis of multithreaded applications
Violations of a number of common safety properties of multithreaded programs–such as atomicity and absence of dataraces–cannot be observed by looking at the linear execution t...
Koushik Sen, Abhay Vardhan, Gul Agha, Grigore Rosu
POLICY
2005
Springer
14 years 3 months ago
Policy Conflict Analysis for Quality of Service Management
Policy-based management provides the ability to (re-)configure differentiated services networks so that desired Quality of Service (QoS) goals are achieved. Relevant configuration...
Marinos Charalambides, Paris Flegkas, George Pavlo...
SIGCOMM
2010
ACM
13 years 10 months ago
Internet inter-domain traffic
In this paper, we examine changes in Internet inter-domain traffic demands and interconnection policies. We analyze more than 200 Exabytes of commercial Internet traffic over a tw...
Craig Labovitz, Scott Iekel-Johnson, Danny McPhers...
RAID
2004
Springer
14 years 3 months ago
Formal Reasoning About Intrusion Detection Systems
We present a formal framework for the analysis of intrusion detection systems (IDS) that employ declarative rules for attack recognition, e.g. specification-based intrusion detect...
Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Ka...
ICSE
2008
IEEE-ACM
14 years 10 months ago
Detecting model inconsistency through operation-based model construction
Nowadays, large-scale industrial software systems may involve hundreds of developers working on hundreds of different but related models representing parts of the same system spec...
Xavier Blanc, Isabelle Mounier, Alix Mougenot, Tom...