-
5
-
-
85084162735
-
A secure environment for untrusted helper applications: Confining the wily hacker
-
San Jose, CA, 1996. USENIX Association: Berkeley, CA
-
Goldberg I, Wagner D, Thomas R, Brewer EA. A secure environment for untrusted helper applications: Confining the wily hacker. Proceedings of the 1996 USENIX Security Symposium, San Jose, CA, 1996. USENIX Association: Berkeley, CA, 1996.
-
(1996)
Proceedings of the 1996 USENIX Security Symposium
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
6
-
-
0028714365
-
Automated detection of vulnerabilities in privileged programs by execution monitoring
-
IEEE Computer Society Press: Los Alamitos. CA
-
Ko C, Fink G, Levitt K. Automated detection of vulnerabilities in privileged programs by execution monitoring. Proceedings of the 10th Annual Computer Security Applications Conference. IEEE Computer Society Press: Los Alamitos. CA, 1994; 134-144.
-
(1994)
Proceedings of the 10th Annual Computer Security Applications Conference
, pp. 134-144
-
-
Ko, C.1
Fink, G.2
Levitt, K.3
-
7
-
-
0029716418
-
A sense of self for UNIX processes
-
IEEE Computer Society Press: Los Alamitos, CA
-
Forrest S, Hofmeyr SA, Somayaji A, Longstaff TA. A sense of self for UNIX processes. Proceedings of the 1996 IEEE Symposium on Security and Privacy. IEEE Computer Society Press: Los Alamitos, CA. 1996; 120-128.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
13
-
-
0036082885
-
A comparison of input representations in neural networks: A case study in intrusion detection
-
Honolulu, HI, May
-
Liu Z, Florez G, Bridges S. A comparison of input representations in neural networks: A case study in intrusion detection. Proceedings of the 2002 International Joint Conference on Neural Networks (ICJNN'02), Honolulu, HI, May 2002.
-
(2002)
Proceedings of the 2002 International Joint Conference on Neural Networks (ICJNN'02)
-
-
Liu, Z.1
Florez, G.2
Bridges, S.3
-
16
-
-
84940106242
-
Hardening COTS software with generic software wrappers
-
Oakland, CA. 1999. IEEE Computer Society Press: Los Alamitos, CA
-
Fraser T, Badger L, Feldman M. Hardening COTS software with generic software wrappers. Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA. 1999. IEEE Computer Society Press: Los Alamitos, CA, 1999; 399-413.
-
(1999)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 399-413
-
-
Fraser, T.1
Badger, L.2
Feldman, M.3
-
17
-
-
0003246945
-
SLIC: An extensibility system for commodity operating systems
-
New Orleans, LA
-
Ghormley DP, Petrou D, Rodrigues SH, Anderson TE. SLIC: An extensibility system for commodity operating systems. Proceedings of 1998 USENIX Annual Technical Conference, New Orleans, LA, 1998; 39-52.
-
(1998)
Proceedings of 1998 USENIX Annual Technical Conference
, pp. 39-52
-
-
Ghormley, D.P.1
Petrou, D.2
Rodrigues, S.H.3
Anderson, T.E.4
-
19
-
-
1542697134
-
SubDomain: Parsimonious server security
-
New Orleans, LA
-
Cowan C, Black A, Krasic C, Pu C, Walpole J, Consel C, Volanschi E. SubDomain: Parsimonious server security. Proceedings of USENIX 14th Systems Administration Conference, New Orleans, LA, 2000.
-
(2000)
Proceedings of USENIX 14th Systems Administration Conference
-
-
Cowan, C.1
Black, A.2
Krasic, C.3
Pu, C.4
Walpole, J.5
Consel, C.6
Volanschi, E.7
-
21
-
-
85084160094
-
Profiling and tracing dynamic library usage via interposition
-
USENIX Association: Berkeley, CA
-
Curry TW. Profiling and tracing dynamic library usage via interposition. Proceedings of the USENIX 1994 Summer Conference. USENIX Association: Berkeley, CA, 1994; 267-278.
-
(1994)
Proceedings of the USENIX 1994 Summer Conference
, pp. 267-278
-
-
Curry, T.W.1
-
22
-
-
0006062387
-
Generation of application level audit data via library interposition
-
COAST Laboratory, Purdue University
-
Kuperman B, Spafford E. Generation of application level audit data via library interposition. Technical Report TR 99-11, COAST Laboratory, Purdue University, 1998.
-
(1998)
Technical Report
, vol.TR 99-11
-
-
Kuperman, B.1
Spafford, E.2
-
23
-
-
85180753454
-
User-level infrastructure for system call interposition: A platform for intrusion detection and confinement
-
Jain K, Sekar R. User-level infrastructure for system call interposition: A platform for intrusion detection and confinement. Proceedings of the Network and Distributed Systems Security, 2000; 19-34.
-
(2000)
Proceedings of the Network and Distributed Systems Security
, pp. 19-34
-
-
Jain, K.1
Sekar, R.2
-
29
-
-
0032598743
-
Software fault tolerance in a clustered architecture: Techniques and reliability modeling
-
Snowmass, CO, 1999. IEEE Press: Piscataway, NJ
-
Lyu MR, Mendiratta VB. Software fault tolerance in a clustered architecture: Techniques and reliability modeling. Proceedings of the 1999 IEEE Aerospace Conference, Snowmass, CO, 1999. IEEE Press: Piscataway, NJ, 1999; 141-150.
-
(1999)
Proceedings of the 1999 IEEE Aerospace Conference
, pp. 141-150
-
-
Lyu, M.R.1
Mendiratta, V.B.2
-
30
-
-
3042635054
-
Scalable monitoring and configuration tools for Grids and clusters
-
Canary Islands, Spain, January
-
Augerat P, Martin C, Stein B. Scalable monitoring and configuration tools for Grids and clusters. Proceedings of the 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, Canary Islands, Spain, January 2002.
-
(2002)
Proceedings of the 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing
-
-
Augerat, P.1
Martin, C.2
Stein, B.3
-
31
-
-
0036723594
-
Deadlock detection in MPI programs
-
Luecke GR, Zou Y, Coyle J, Hoekstra J, Kraeva M. Deadlock detection in MPI programs. Concurrency and Computation: Practice and Experience 2003; 14(11):911-932.
-
(2003)
Concurrency and Computation: Practice and Experience
, vol.14
, Issue.11
, pp. 911-932
-
-
Luecke, G.R.1
Zou, Y.2
Coyle, J.3
Hoekstra, J.4
Kraeva, M.5
-
33
-
-
0030243005
-
A high-performance, portable implementation of the MPI message-passing interface standard
-
Gropp W, Lusk E, Doss N, Skjellum A. A high-performance, portable implementation of the MPI message-passing interface standard. Parallel Computing 1996; 22:789-828.
-
(1996)
Parallel Computing
, vol.22
, pp. 789-828
-
-
Gropp, W.1
Lusk, E.2
Doss, N.3
Skjellum, A.4
-
34
-
-
0346941337
-
A multi-threaded Message Passing Interface (MPI) architecture: Performance and program issues
-
Protopopov B, Skjellum A. A multi-threaded Message Passing Interface (MPI) architecture: Performance and program issues. Journal of Parallel and Distributed Computing 1997; 61(4):449-466.
-
(1997)
Journal of Parallel and Distributed Computing
, vol.61
, Issue.4
, pp. 449-466
-
-
Protopopov, B.1
Skjellum, A.2
-
36
-
-
27644502235
-
Solving systems of linear equations using LU factorization
-
Mississippi State University
-
Dandass Y. Solving systems of linear equations using LU factorization. Technical Report, Mississippi State University, 1999.
-
(1999)
Technical Report
-
-
Dandass, Y.1
-
38
-
-
3042635053
-
Attacking a high performance computer cluster
-
Ottawa, Canada
-
Torres M, Vaughn R, Bridges S, Florez G, Liu Z. Attacking a high performance computer cluster. Proceedings of the 15th Annual Canadian Information Technology Security Symposium, Ottawa, Canada, 2003.
-
(2003)
Proceedings of the 15th Annual Canadian Information Technology Security Symposium
-
-
Torres, M.1
Vaughn, R.2
Bridges, S.3
Florez, G.4
Liu, Z.5
-
40
-
-
27644437094
-
Using adaboost with different network topologies for system call analysis
-
Rolla, MO, November
-
Florez G, Boggess L. Using adaboost with different network topologies for system call analysis. Proceedings of the 2002 ANNIE Conference, Rolla, MO, November 2002.
-
(2002)
Proceedings of the 2002 ANNIE Conference
-
-
Florez, G.1
Boggess, L.2
-
41
-
-
27644490136
-
Classification of anomalous traces of privileged and parallel programs by neural networks
-
St. Louis, MO, May
-
Liu Z, Bridges S, Vaughn R. Classification of anomalous traces of privileged and parallel programs by neural networks. Proceedings of FUZZIEEE 2003, St. Louis, MO, May 2003.
-
(2003)
Proceedings of FUZZIEEE 2003
-
-
Liu, Z.1
Bridges, S.2
Vaughn, R.3
-
42
-
-
85042797742
-
Learning program behavior profiles for intrusion detection
-
Sanata Clara, CA, April 1999. USENIX Association: Berkeley, CA
-
Ghosh A, Schwartzbard A, Schatz M. Learning program behavior profiles for intrusion detection. Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Sanata Clara, CA, April 1999. USENIX Association: Berkeley, CA, 1999.
-
(1999)
Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring
-
-
Ghosh, A.1
Schwartzbard, A.2
Schatz, M.3
-
43
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
Rabiner L. A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE 1989; 77(2):257-286.
-
(1989)
Proceedings of the IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.1
-
44
-
-
0003605996
-
The NAS parallel benchmarks 2.0
-
NASA Ames Research Center, Moffett Field, CA
-
Bailey D, Harris T, Saphir W, van der Wingaart R, Woo A, Yarrow M. The NAS Parallel Benchmarks 2.0. Technical Report NAS-95-020, NASA Ames Research Center, Moffett Field, CA, 1995.
-
(1995)
Technical Report
, vol.NAS-95-020
-
-
Bailey, D.1
Harris, T.2
Saphir, W.3
Van Der Wingaart, R.4
Woo, A.5
Yarrow, M.6
|