Sciweavers

2287 search results - page 174 / 458
» Making it Real
Sort
View
EMISA
2004
Springer
14 years 1 months ago
A Virtual Laboratory for IT Security Education
Abstract: Success of IT security not only depends on the evolution of technologies, but also relies on the knowledge of IT-Personnel and the level of their IT-security education. I...
Ji Hu, Dirk Cordel, Christoph Meinel
ICCS
2004
Springer
14 years 1 months ago
Using Runtime Measurements and Historical Traces for Acquiring Knowledge in Parallel Applications
Abstract. A new approach for acquiring knowledge of parallel applications regarding resource usage and for searching similarity on workload traces is presented. The main goal is to...
Luciano José Senger, Marcos José San...
AGP
2003
IEEE
14 years 1 months ago
Reasoning about the Semantic Web using Answer Set Programming
The paper discusses some innovative aspects related to the integration of a framework based on Answer Set Programming in an Information Retrieval Agent, namely, the Global Search A...
Giovambattista Ianni, Francesco Calimeri, Vincenzi...
NDSS
2003
IEEE
14 years 1 months ago
A Virtual Machine Introspection Based Architecture for Intrusion Detection
Today’s architectures for intrusion detection force the IDS designer to make a difficult choice. If the IDS resides on the host, it has an excellent view of what is happening i...
Tal Garfinkel, Mendel Rosenblum
SRDS
2003
IEEE
14 years 1 months ago
Transparent Runtime Randomization for Security
A large class of security attacks exploit software implementation vulnerabilities such as unchecked buffers. This paper proposes Transparent Runtime Randomization (TRR), a general...
Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer