Sciweavers

171 search results - page 16 / 35
» Operating system enhancements to prevent the misuse of syste...
Sort
View
SAFECOMP
2009
Springer
14 years 1 months ago
Reliability Analysis for the Advanced Electric Power Grid: From Cyber Control and Communication to Physical Manifestations of Fa
The advanced electric power grid is a cyber-physical system comprised of physical components such as transmission lines and generators and a network of embedded systems deployed fo...
Ayman Z. Faza, Sahra Sedigh, Bruce M. McMillin
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
14 years 1 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
SRDS
2007
IEEE
14 years 1 months ago
RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization
Code injection attacks are a top threat to today’s Internet. With zero-day attacks on the rise, randomization techniques have been introduced to diversify software and operation...
Xuxian Jiang, Helen J. Wang, Dongyan Xu, Yi-Min Wa...
CORR
2010
Springer
97views Education» more  CORR 2010»
13 years 6 months ago
Towards a Collision-Free WLAN: Dynamic Parameter Adjustment in CSMA/E2CA
Abstract—Carrier Sense Multiple Access with Enhanced Collision Avoidance (CSMA/ECA) is a distributed MAC protocol that allows collision-free access to the medium in WLAN. The onl...
Jaume Barceló, Boris Bellalta, Cristina Can...
LISA
2003
13 years 8 months ago
Virtual Appliances for Deploying and Maintaining Software
This paper attempts to address the complexity of system administration by making the labor of applying software updates independent of the number of computers on which the softwar...
Constantine P. Sapuntzakis, David Brumley, Ramesh ...