Sciweavers

8177 search results - page 75 / 1636
» Detecting System Emulators
Sort
View
RAID
2004
Springer
14 years 3 months ago
Detecting Unknown Massive Mailing Viruses Using Proactive Methods
The detection of unknown viruses is beyond the capability of many existing virus detection approaches. In this paper, we show how proactive customization of system behaviors can be...
Ruiqi Hu, Aloysius K. Mok
ACSAC
1998
IEEE
14 years 2 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron
CCS
2003
ACM
14 years 3 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
SOSP
2005
ACM
14 years 7 months ago
Hibernator: helping disk arrays sleep through the winter
Energy consumption has become an important issue in high-end data centers, and disk arrays are one of the largest energy consumers within them. Although several attempts have been...
Qingbo Zhu, Zhifeng Chen, Lin Tan, Yuanyuan Zhou, ...
USENIX
2008
14 years 11 days ago
Large-scale Virtualization in the Emulab Network Testbed
Network emulation is valuable largely because of its ability to study applications running on real hosts and "somewhat real" networks. However, conservatively allocating...
Mike Hibler, Robert Ricci, Leigh Stoller, Jonathon...