Sciweavers

371 search results - page 22 / 75
» From the Guest Editors
Sort
View
RAID
2010
Springer
13 years 5 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
ICPR
2006
IEEE
14 years 8 months ago
Sociometry Based Multiparty Audio Recordings Summarization
This paper shows how Social Network Analysis, the study of relational data in specific social environments, can be used to summarize multiparty radio news recordings. A social net...
Alessandro Vinciarelli
EUROPAR
2008
Springer
13 years 9 months ago
Efficient Shared Memory Message Passing for Inter-VM Communications
Thanks to recent advances in virtualization technologies, it is now possible to benefit from the flexibility brought by virtual machines at little cost in terms of CPU performance....
François Diakhaté, Marc Pérac...
ICISC
2007
99views Cryptology» more  ICISC 2007»
13 years 9 months ago
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module
VMM (virtual machine monitor) based system provides the useful inspection and interposition of guest OS. With proper modification of guest OS, we can obtain event-driven memory sn...
Ruo Ando, Youki Kadobayashi, Yoichi Shinoda
SIGOPS
2008
156views more  SIGOPS 2008»
13 years 7 months ago
O2S2: enhanced object-based virtualized storage
Object based storage devices (OSDs) elevate the level of abstraction presented to clients, thereby permitting them to offer methods for managing, sharing, and securing information...
Himanshu Raj, Karsten Schwan