Sciweavers

1804 search results - page 324 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
DSN
2005
IEEE
14 years 2 months ago
TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks
Since sensor data gathering is the primary functionality of sensor networks, it is important to provide a fault tolerant method for reasoning about sensed events in the face of ar...
Mark D. Krasniewski, Padma Varadharajan, Bryan Rab...
UIST
1997
ACM
14 years 1 months ago
Designing and Implementing Asynchronous Collaborative Applications with Bayou
Asynchronous collaboration is characterized by the degree of independence collaborators have from one another. In particular, collaborators working asynchronously typically have l...
W. Keith Edwards, Elizabeth D. Mynatt, Karin Peter...
CCS
2009
ACM
14 years 24 days ago
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks
Despite the many efforts made in recent years to mitigate runtime attacks such as stack and heap based buffer overflows, these attacks are still a common security concern in today...
Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy
EUC
2008
Springer
13 years 10 months ago
Design and Analysis of a Stable Queue Control Scheme for the Internet
The recently proposed Active Queue Management (AQM) is an effective method used in Internet routers for congestion control, and to achieve a tradeoff between link utilization and ...
Naixue Xiong, Laurence Tianruo Yang, Yaoxue Zhang,...
IWPC
2006
IEEE
14 years 2 months ago
Towards a Client Driven Characterization of Class Hierarchies
Object-oriented legacy systems are hard to maintain because they are hard to understand. One of the main understanding problems is revealed by the so-called ”yo-yo effect” tha...
Petru Florin Mihancea