Sciweavers

377 search results - page 41 / 76
» Operating system virtualization: practice and experience
Sort
View
RAID
2007
Springer
14 years 4 months ago
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems
We present a novel approach to remote traffic aggregation for Network Intrusion Detection Systems (NIDS) called Cooperative Selective Wormholing (CSW). Our approach works by select...
John R. Lange, Peter A. Dinda, Fabián E. Bu...
CAV
2008
Springer
160views Hardware» more  CAV 2008»
13 years 12 months ago
Scalable Shape Analysis for Systems Code
Pointer safety faults in device drivers are one of the leading causes of crashes in operating systems code. In principle, shape analysis tools can be used to prove the absence of t...
Hongseok Yang, Oukseh Lee, Josh Berdine, Cristiano...
RAID
2007
Springer
14 years 4 months ago
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
Xuxian Jiang, Xinyuan Wang
IJWIN
2010
117views more  IJWIN 2010»
13 years 4 months ago
Channel Models for Medical Implant Communication
Information regarding the propagation media is typically gathered by conducting physical experiments, measuring and processing the corresponding data to obtain channel characterist...
Kamran Sayrafian-Pour, Wen-Bin Yang, John G. Haged...
COMSIS
2007
80views more  COMSIS 2007»
13 years 10 months ago
"Security of Computer Systems and Networks" Book Preview
This paper presents preview of the new book titled “Security of Computer Systems and Networks” (original in Serbian language “Sigurnost računarskih sistema i mreža”) – ...
Dragan Pleskonjic, Nemanja Macek, Borislav Djordje...