-
3
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, and Paul Barham. Vigilante: end-to-end containment of internet worms. In Proceedings of the Symposium on Operating Systems Principles (SOSP), pages 133-147, 2005.
-
(2005)
Proceedings of the Symposium on Operating Systems Principles (SOSP)
, pp. 133-147
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
5
-
-
33846240903
-
Wu chang Feng, Wu chi Feng, David Maier, and Jim Snow. Automatic high-performance reconstruction and recovery
-
From Intrusion Detection to Self-Protection, April
-
Ashvin Goel, Wu chang Feng, Wu chi Feng, David Maier, and Jim Snow. Automatic high-performance reconstruction and recovery. Journal of Computer Networks, 51(5):1361-1377, April 2007. From Intrusion Detection to Self-Protection.
-
(2007)
Journal of Computer Networks
, vol.51
, Issue.5
, pp. 1361-1377
-
-
Goel, A.1
-
7
-
-
0023963197
-
Recovery management in Quicksilver
-
Roger Haskin, Yoni Malachi, Wayne Sawdon, and Gregory Chan. Recovery management in Quicksilver. ACM Transactions on Computer Systems, 6(1):82-108, 1988.
-
(1988)
ACM Transactions on Computer Systems
, vol.6
, Issue.1
, pp. 82-108
-
-
Haskin, R.1
Malachi, Y.2
Sawdon, W.3
Chan, G.4
-
9
-
-
39049086327
-
Back to the future: A framework for automatic malware removal and system repair
-
December
-
Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li, and Zhendong Su. Back to the future: A framework for automatic malware removal and system repair. In Proceedings of the Annual Computer Security Applications Conference, December 2006.
-
(2006)
Proceedings of the Annual Computer Security Applications Conference
-
-
Hsu, F.1
Chen, H.2
Ristenpart, T.3
Li, J.4
Su, Z.5
-
13
-
-
59249090440
-
-
John Leyden. Spyware poses as Firefox extension. urlhttp://www. theregister.co.uk/2006/07/26/firefox-malware-extension, July 2006.
-
John Leyden. Spyware poses as Firefox extension. urlhttp://www. theregister.co.uk/2006/07/26/firefox-malware-extension, July 2006.
-
-
-
-
15
-
-
59249097919
-
-
Linux. Man capabilities(7) in Linux man page. Confirming to POSIX.le.
-
Linux. Man capabilities(7) in Linux man page. Confirming to POSIX.le.
-
-
-
-
18
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
February
-
James Newsome and Dawn Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the Network and Distributed System Security Symposium, February 2005.
-
(2005)
Proceedings of the Network and Distributed System Security Symposium
-
-
Newsome, J.1
Song, D.2
-
19
-
-
33244463191
-
Ext3cow: A time-shifting file system for regulatory compliance
-
May
-
Zachary N.J. Peterson and Randal Burns. Ext3cow: A time-shifting file system for regulatory compliance. ACM Transactions on Storage, 1(2):190-212, May 2005.
-
(2005)
ACM Transactions on Storage
, vol.1
, Issue.2
, pp. 190-212
-
-
Peterson, Z.N.J.1
Burns, R.2
-
21
-
-
85010767984
-
The use of name spaces in Plan 9
-
Rob Pike, Dave Presotto, Ken Thompson, Howard Trickey, and Phil Winterbottom. The use of name spaces in Plan 9. ACM Operating Systems Review, 27(2):72-76, 1993.
-
(1993)
ACM Operating Systems Review
, vol.27
, Issue.2
, pp. 72-76
-
-
Pike, R.1
Presotto, D.2
Thompson, K.3
Trickey, H.4
Winterbottom, P.5
-
25
-
-
0042352263
-
Deciding when to forget in the Elephant file system
-
December
-
Douglas S. Santry, Michael J. Feeley, Norman C. Hutchinson, Alistair C. Veitch, Ross W. Carton, and Jacob Ofir. Deciding when to forget in the Elephant file system. In Proceedings of the Symposium on Operating Systems Principles (SOSP), pages 110-123, December 1999.
-
(1999)
Proceedings of the Symposium on Operating Systems Principles (SOSP)
, pp. 110-123
-
-
Santry, D.S.1
Feeley, M.J.2
Hutchinson, N.C.3
Veitch, A.C.4
Carton, R.W.5
Ofir, J.6
-
28
-
-
34548029519
-
Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors
-
Stephen Soltesz, Herbert Pötzl, Marc E. Fiuczynski, Andy Bavier, and Larry Peterson. Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors. In Proceedings of the EuroSys conference, pages 275-287, 2007.
-
(2007)
Proceedings of the EuroSys conference
, pp. 275-287
-
-
Soltesz, S.1
Pötzl, H.2
Fiuczynski, M.E.3
Bavier, A.4
Peterson, L.5
-
29
-
-
33845428560
-
Secure program execution via dynamic information flow tracking
-
G. Edward Suh, Jae W. Lee, David Zhang, and Srinivas Devadas. Secure program execution via dynamic information flow tracking. In Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems, pages 85-96, 2004.
-
(2004)
Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 85-96
-
-
Edward Suh, G.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
32
-
-
33845192207
-
Managing update conflicts in Bayou, a weakly connected replicated storage system
-
December
-
Douglas B. Terry, Marvin M. Theimer, Karin Petersen, Alan J. Demers, Mike J. Spreitzer, and Carl H. Hauser. Managing update conflicts in Bayou, a weakly connected replicated storage system. In Proceedings of the 15th Symposium on Operating Systems Principles (SOSP), pages 172-183, December 1995.
-
(1995)
Proceedings of the 15th Symposium on Operating Systems Principles (SOSP)
, pp. 172-183
-
-
Terry, D.B.1
Theimer, M.M.2
Petersen, K.3
Demers, A.J.4
Spreitzer, M.J.5
Hauser, C.H.6
-
37
-
-
59249104473
-
-
Andy Watson and Paul Benn. Multiprotocol Data Access: NFS, CIFS, and HTTP. Technical Report TR3014, Network Appliance, Inc., 1999. http://www.netapp.com/tech--library/3014.html.
-
Andy Watson and Paul Benn. Multiprotocol Data Access: NFS, CIFS, and HTTP. Technical Report TR3014, Network Appliance, Inc., 1999. http://www.netapp.com/tech--library/3014.html.
-
-
-
|