Sciweavers

420 search results - page 63 / 84
» Using static analysis for Ajax intrusion detection
Sort
View
IEEEARES
2009
IEEE
14 years 2 months ago
Investigating the Implications of Virtual Machine Introspection for Digital Forensics
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Kara L. Nance, Brian Hay, Matt Bishop
LCN
2008
IEEE
14 years 1 months ago
DiCAP: Distributed Packet Capturing architecture for high-speed network links
— IP traffic measurements form the basis of several network management tasks, such as accounting, planning, intrusion detection, and charging. High-speed network links challenge ...
Cristian Morariu, Burkhard Stiller
AIMS
2008
Springer
14 years 1 months ago
Towards Resilient Community Wireless Mesh Networks
Abstract. Wireless Mesh Networks are an increasingly common technology providing connectivity in many communities, particularly where Internet access is unavailable or restricted v...
Sara Bury, Nicholas J. P. Race
IPPS
2000
IEEE
13 years 12 months ago
Applying Interposition Techniques for Performance Analysis of OpenMP Parallel Applications
Tuning parallel applications requires the use of effective tools for detecting performance bottlenecks. Along a parallel program execution, many individual situations of performan...
Marc González, Albert Serra, Xavier Martore...
CSMR
2000
IEEE
13 years 12 months ago
Analyzing Java Software by Combining Metrics and Program Visualization
Shimba, a prototype reverse engineering environment, has been built to support the understanding of Java software. Shimba uses Rigi and SCED to analyze, visualize, and explore the...
Tarja Systä, Ping Yu, Hausi A. Müller