Sciweavers

171 search results - page 12 / 35
» Operating system enhancements to prevent the misuse of syste...
Sort
View
CCS
2004
ACM
14 years 23 days ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
SISW
2005
IEEE
14 years 29 days ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
VTC
2008
IEEE
155views Communications» more  VTC 2008»
14 years 1 months ago
System Performance Analysis of Single-Path and Cooperative MIMO Relaying
— The demand for even higher data rates in future mobile communications systems calls for new techniques capable of improving the performance of cellular systems. One possibility...
Peter Rost, Fredrik Boye, Gerhard Fettweis
SIGOPS
2011
210views Hardware» more  SIGOPS 2011»
13 years 2 months ago
Small trusted primitives for dependable systems
Secure, fault-tolerant distributed systems are difficult to build, to validate, and to operate. Conservative design for such systems dictates that their security and fault toleran...
Petros Maniatis, Byung-Gon Chun
SERVICES
2010
105views more  SERVICES 2010»
13 years 5 months ago
Ensuring Resource-Level Quality for Services on Grids
Abstract--Service-Oriented Architectures address the development of distributed and dynamic service-based applications. Due to the dynamics of their environments, services should b...
Andre Lage Freitas, Jean-Louis Pazat, Nikos Parlav...