Sciweavers

233 search results - page 42 / 47
» The Evolution of System-Call Monitoring
Sort
View
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
14 years 4 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...
PAM
2010
Springer
14 years 4 months ago
Network DVR: A Programmable Framework for Application-Aware Trace Collection
Network traces are essential for a wide range of network applications, including traffic analysis, network measurement, performance monitoring, and security analysis. Existing cap...
Chia-Wei Chang, Alexandre Gerber, Bill Lin, Subhab...
ICC
2009
IEEE
123views Communications» more  ICC 2009»
14 years 4 months ago
Combining Hidden Markov Models for Improved Anomaly Detection
—In host-based intrusion detection systems (HIDS), anomaly detection involves monitoring for significant deviations from normal system behavior. Hidden Markov Models (HMMs) have...
Wael Khreich, Eric Granger, Robert Sabourin, Ali M...
ICRA
2008
IEEE
120views Robotics» more  ICRA 2008»
14 years 4 months ago
Operation of robotic science boats using the telesupervised adaptive ocean sensor fleet system
– This paper describes a multi-robot science exploration software architecture and system called the Telesupervised Adaptive Ocean Sensor Fleet (TAOSF). TAOSF supervises and coor...
Gregg Podnar, John M. Dolan, Alberto Elfes, S. B. ...
OOPSLA
2007
Springer
14 years 3 months ago
Probabilistic calling context
Calling context enhances program understanding and dynamic analyses by providing a rich representation of program location. Compared to imperative programs, objectoriented program...
Michael D. Bond, Kathryn S. McKinley