Sciweavers

15379 search results - page 89 / 3076
» Protecting users from
Sort
View
CN
2007
179views more  CN 2007»
13 years 7 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
SIGOPS
2008
95views more  SIGOPS 2008»
13 years 7 months ago
Virtual machine time travel using continuous data protection and checkpointing
Virtual machine (VM) time travel enables reverting a virtual machine's state, both transient and persistent, to past points in time. This capability can be used to improve vi...
Paula Ta-Shma, Guy Laden, Muli Ben-Yehuda, Michael...
HCI
2009
13 years 5 months ago
An Interactive-Content Technique Based Approach to Generating Personalized Advertisement for Privacy Protection
Personalized contents have been getting more attention from industry and academia due to its effective communicative role in product advertisements. However, there exist potential ...
Wook-Hee Min, Yun-Gyung Cheong
ICPPW
2002
IEEE
14 years 21 days ago
Dynamic Expansion of M : N Protection Groups in GMPLS Optical Networks
Abstract— In order to provide reliable connections across metropolitan and wide-area optical networks, the network operator must provide some degree of redundancy so that traffic...
David W. Griffith, SuKyoung Lee
INFOCOM
2009
IEEE
14 years 2 months ago
CFP: Cooperative Fast Protection
—We introduce a novel protection scheme, called Cooperative Fast Protection (CFP), to fight against a single link failure in survivable WDM (Wavelength Division Multiplexing) mes...
Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Ta...