Sciweavers

6199 search results - page 167 / 1240
» Monitoring the
Sort
View
SP
1997
IEEE
130views Security Privacy» more  SP 1997»
15 years 8 months ago
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach
This paper describes a specification-based approach to detect exploitations of vulnerabdities in securitycritical programs. The approach utilizes security specifications that desc...
Calvin Ko, Manfred Ruschitzka, Karl N. Levitt
AINA
2007
IEEE
15 years 8 months ago
Specification Synthesis for Monitoring and Analysis of MANET Protocols
This paper introduces an approach to automatic synthesis of the specification models of routing protocol behavior from the observed flow of the network traffic. In particular, our...
Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xi...
AINA
2007
IEEE
15 years 8 months ago
Towards Integrated Services for Health Monitoring
The emergence of short-range wireless communications hold the promise of realizing the grand vision of the next generation communication networks in which devices follow a always ...
Chunming Rong, Hein Meling, Dagfinn Waage
HOTOS
2009
IEEE
15 years 8 months ago
Computer Meteorology: Monitoring Compute Clouds
Cloud computing environments allow customers to execute arbitrary code on hardware owned by a cloud provider. While cloud providers use virtualization to ensure isolation between ...
Lionel Litty, H. Andrés Lagar-Cavilla, Davi...
APNOMS
2006
Springer
15 years 8 months ago
A Proposal of Large-Scale Traffic Monitoring System Using Flow Concentrators
In a large-scale backbone networks, the traffic monitoring system needs to receive a large volume of flow records, so if a single central collecting process is used, it might not b...
Atsushi Kobayashi, Daisuke Matsubara, Shingo Kimur...