Sciweavers

1753 search results - page 325 / 351
» IRON file systems
Sort
View
DIMVA
2008
14 years 11 days ago
Expanding Malware Defense by Securing Software Installations
Software installation provides an attractive entry vector for malware: since installations are performed with administrator privileges, malware can easily get the enhanced level of...
Weiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkat...
DIMVA
2006
14 years 10 days ago
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones
Wireless devices that integrate the functionality of PDAs and cell phones are becoming commonplace, making different types of network services available to mobile applications. How...
Collin Mulliner, Giovanni Vigna, David Dagon, Wenk...
NSDI
2004
14 years 9 days ago
TimeLine: A High Performance Archive for a Distributed Object Store
This paper describes TimeLine, an efficient archive service for a distributed storage system. TimeLine allows users to take snapshots on demand. The archive is stored online so th...
Chuang-Hue Moh, Barbara Liskov
CCS
2010
ACM
13 years 11 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
BMCBI
2010
191views more  BMCBI 2010»
13 years 11 months ago
BiGG: a Biochemical Genetic and Genomic knowledgebase of large scale metabolic reconstructions
Background: Genome-scale metabolic reconstructions under the Constraint Based Reconstruction and Analysis (COBRA) framework are valuable tools for analyzing the metabolic capabili...
Jan Schellenberger, Junyoung O. Park, Tom M. Conra...