-
1
-
-
16244386509
-
Self Checking Network Protocols: A Monitor Based Approach
-
October
-
G. Khanna, P. Varadharajan, and S. Bagchi, "Self Checking Network Protocols: A Monitor Based Approach," In Proceedings of the 23rd IEEE Symposium on Reliable Distributed Systems (SRDS '04), pp. 18-30, October 2004.
-
(2004)
Proceedings of the 23rd IEEE Symposium on Reliable Distributed Systems (SRDS '04)
, pp. 18-30
-
-
Khanna, G.1
Varadharajan, P.2
Bagchi, S.3
-
2
-
-
0028755449
-
Observer-A Concept for Formal On-Line Validation of Distributed Systems
-
Dec
-
M. Diaz, G. Juanole, and J.-P. Courtiat, "Observer-A Concept for Formal On-Line Validation of Distributed Systems," IEEE Trans. on Software Engineering, vol. 20, no. 12, pp. 900-913, Dec 1994.
-
(1994)
IEEE Trans. on Software Engineering
, vol.20
, Issue.12
, pp. 900-913
-
-
Diaz, M.1
Juanole, G.2
Courtiat, J.-P.3
-
4
-
-
0036343640
-
A Congestion Control Algorithm for Tree-based Reliable Multicast Protocols
-
D. M. Chiu, M. Kadansky, J. Provino, J. Wesley, H. Bischof, and H. Zhu, "A Congestion Control Algorithm for Tree-based Reliable Multicast Protocols," In Proceedings of INFOCOM '02, pp.1209-1217, 2002.
-
(2002)
Proceedings of INFOCOM '02
, pp. 1209-1217
-
-
Chiu, D.M.1
Kadansky, M.2
Provino, J.3
Wesley, J.4
Bischof, H.5
Zhu, H.6
-
5
-
-
0002432457
-
A coding approach to event correlation
-
S. Kliger, S. Yemini, Y. Yemini, D. Ohsie, and S. Stolfo, "A coding approach to event correlation," Intelligent Network Management, pp. 266-277, 1997.
-
(1997)
Intelligent Network Management
, pp. 266-277
-
-
Kliger, S.1
Yemini, S.2
Yemini, Y.3
Ohsie, D.4
Stolfo, S.5
-
6
-
-
47249083235
-
-
http://www.experimentalstuff.com/Technologies/JRMS/
-
-
-
-
7
-
-
33646720966
-
Automated Online Monitoring of Distributed Applications through External Monitors
-
In the, Apr-Jun
-
G. Khanna, P. Varadharajan, and S. Bagchi, "Automated Online Monitoring of Distributed Applications through External Monitors," In the IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 3, no. 2, pp. 115-129, Apr-Jun, 2006.
-
(2006)
IEEE Transactions on Dependable and Secure Computing (TDSC)
, vol.3
, Issue.2
, pp. 115-129
-
-
Khanna, G.1
Varadharajan, P.2
Bagchi, S.3
-
8
-
-
0034590171
-
On the Quality of Service of Failure Detectors
-
Jun
-
W. Chen, S. Toueg, and M. K. Aguilera, "On the Quality of Service of Failure Detectors," In IEEE International Conference on Dependable Systems and Networks (DSN'00), pp. 191-201, Jun 2000.
-
(2000)
IEEE International Conference on Dependable Systems and Networks (DSN'00)
, pp. 191-201
-
-
Chen, W.1
Toueg, S.2
Aguilera, M.K.3
-
9
-
-
0034590871
-
From Crash Fault-Tolerance to Arbitrary-Fault Tolerance: Towards a Modular Approach
-
Jun
-
R. Baldoni, J.-M. Helary, and M. Raynal, "From Crash Fault-Tolerance to Arbitrary-Fault Tolerance: Towards a Modular Approach," In IEEE International Conference on Dependable Systems and Networks (DSN'00), pp. 273-282, Jun 2000.
-
(2000)
IEEE International Conference on Dependable Systems and Networks (DSN'00)
, pp. 273-282
-
-
Baldoni, R.1
Helary, J.-M.2
Raynal, M.3
-
10
-
-
16244398811
-
Hierarchical Object Oriented Approach to Fault Tolerance in Distributed Systems
-
93, pp, Nov
-
S. Krishna, T. Diamond, and V. S. S. Nair, "Hierarchical Object Oriented Approach to Fault Tolerance in Distributed Systems," In Proceedings of IEEE International Symposium on Software Reliability Engineering (ISSRE '93), pp. 168-177, Nov 1993.
-
(1993)
Proceedings of IEEE International Symposium on Software Reliability Engineering (ISSRE
, pp. 168-177
-
-
Krishna, S.1
Diamond, T.2
Nair, V.S.S.3
-
11
-
-
0026120365
-
Modeling and Verification of Time Dependent Systems using Time Petri Nets
-
Mar
-
B. Berthomieu and M. Diaz, "Modeling and Verification of Time Dependent Systems using Time Petri Nets," IEEE Trans. on Software Engineering, vol. 17, no. 3, pp. 259-273, Mar 1991.
-
(1991)
IEEE Trans. on Software Engineering
, vol.17
, Issue.3
, pp. 259-273
-
-
Berthomieu, B.1
Diaz, M.2
-
12
-
-
0029427762
-
Deadlock Detection in Communicating Finite State Machines by Even Reachability Analysis
-
Sep
-
W. Peng, "Deadlock Detection in Communicating Finite State Machines by Even Reachability Analysis," IEEE Conference on Computer Communications and Networks (ICCCN), pp. 656-662, Sep 1995.
-
(1995)
IEEE Conference on Computer Communications and Networks (ICCCN)
, pp. 656-662
-
-
Peng, W.1
-
14
-
-
8344272783
-
What's new: Finding significant differences in network data streams
-
G. Cormode and S. Muthukrishnan, "What's new: finding significant differences in network data streams," In INFOCOM 2004, Vol. 3, pp 1534-1545, 2004.
-
(2004)
INFOCOM
, vol.3
, pp. 1534-1545
-
-
Cormode, G.1
Muthukrishnan, S.2
-
15
-
-
47249149958
-
Reverse Hashing for Sketch-based Change Detection on High-speed Networks
-
April
-
R. Schweller, Y. Chen, E. Parsons, A. Gupta, G. Memik, and Y. Zhang, "Reverse Hashing for Sketch-based Change Detection on High-speed Networks," In INFOCOM 2006, pp1-12, April 2006.
-
(2006)
In INFOCOM 2006
, pp. 1-12
-
-
Schweller, R.1
Chen, Y.2
Parsons, E.3
Gupta, A.4
Memik, G.5
Zhang, Y.6
-
16
-
-
78650098476
-
Sketch-based Change Detection
-
IMC
-
B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen, "Sketch-based Change Detection," In ACM Internet Measurement Conference, IMC, 2003.
-
(2003)
ACM Internet Measurement Conference
-
-
Krishnamurthy, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
18
-
-
0029719644
-
The space complexity of approximating the frequency moments
-
May 22-24
-
N. Alon, Y. Matias, and M. Szegedy, "The space complexity of approximating the frequency moments," In Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, p.20-29, May 22-24, 1996.
-
(1996)
Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
, pp. 20-29
-
-
Alon, N.1
Matias, Y.2
Szegedy, M.3
-
19
-
-
4544342880
-
SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments
-
June 28-July 1, Florence, Italy
-
S. Bagchi, Y. Wu, Sachin Garg, N. Singh, and T. Tsai, "SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments," At IEEE Dependable Systems and Networks (DSN 2004), June 28-July 1, 2004, Florence, Italy.
-
(2004)
At IEEE Dependable Systems and Networks (DSN
-
-
Bagchi, S.1
Wu, Y.2
Garg, S.3
Singh, N.4
Tsai, T.5
-
20
-
-
62349108537
-
A Stateful Intrusion Detection System for World-Wide Web Servers
-
ACSAC
-
G. Vigna, W. Robertson, V. Kher, and R.A. Kemmerer, "A Stateful Intrusion Detection System for World-Wide Web Servers," In Proc. of the Annual Computer Security Applications Conference (ACSAC), 2003.
-
(2003)
Proc. of the Annual Computer Security Applications Conference
-
-
Vigna, G.1
Robertson, W.2
Kher, V.3
Kemmerer, R.A.4
-
21
-
-
65249090163
-
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware
-
Queensland, Australia, September
-
M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, B. Tierney, "The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware," Proc. of the Symp. on Recent Advances in Intrusion Detection (RAID), Queensland, Australia, September 2007.
-
(2007)
Proc. of the Symp. on Recent Advances in Intrusion Detection (RAID)
-
-
Vallentin, M.1
Sommer, R.2
Lee, J.3
Leres, C.4
Paxson, V.5
Tierney, B.6
-
22
-
-
0033295259
-
Bro: A System for Detecting Network Intruders in Real-Time
-
V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Computer Networks 31(23-24) (1999) 2435-2463.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
|