-
1
-
-
51649087689
-
-
Multi-Level Intrusion Detection System (ML-IDS)
-
Y. Al-Nashif, A. Kumar, S. Hariri, Y. Luo, F. Szidarovsky, and G. Qu. Multi-Level Intrusion Detection System (ML-IDS). In Autonomic Computing, 2008. ICAC'08. International Conference on, pages 131-140, 2008.
-
(2008)
Autonomic Computing, 2008. ICAC'08. International Conference on
, pp. 131-140
-
-
Al-Nashif, Y.1
Kumar, A.2
Hariri, S.3
Luo, Y.4
Szidarovsky, F.5
Qu, G.6
-
2
-
-
9444241775
-
-
The Geometry Center, University of Minnesota
-
C. Barber and H. Huhdanpaa. Qhull. The Geometry Center, University of Minnesota, http://www.geom.umn.edu/software/qhull.
-
Qhull
-
-
Barber, C.1
Huhdanpaa, H.2
-
3
-
-
77954710473
-
-
European Network and Information Security Agency (ENISA)
-
D. Barroso. Botnets-The Silent Threat. European Network and Information Security Agency (ENISA), 2007.
-
(2007)
Botnets-The Silent Threat
-
-
Barroso, D.1
-
4
-
-
33745488459
-
Quickly finding known software problems via automated symptom matching
-
June
-
M. Brodie, S. Ma, G. Lohman, L. Mignet, M. Wilding, J. Champlin, and P. Sohn. Quickly finding known software problems via automated symptom matching. In Autonomic Computing, 2005. ICAC 2005. Proceedings. Second International Conference on, pages 101-110, June 2005.
-
(2005)
Autonomic Computing, 2005. ICAC 2005. Proceedings. Second International Conference on
, pp. 101-110
-
-
Brodie, M.1
Ma, S.2
Lohman, G.3
Mignet, L.4
Wilding, M.5
Champlin, J.6
Sohn, P.7
-
5
-
-
30344486259
-
Probabilistic anomaly detection in distributed computer networks
-
M. Burgess. Probabilistic anomaly detection in distributed computer networks. Sci. Comput. Program., 60(1):1-26, 2006.
-
(2006)
Sci. Comput. Program.
, vol.60
, Issue.1
, pp. 1-26
-
-
Burgess, M.1
-
6
-
-
0242572726
-
Measuring system normality
-
M. Burgess, H. Haugerud, S. Straumsnes, and T. Reitan. Measuring system normality. ACM Trans. Comput. Syst., 20(2):125-160, 2002.
-
(2002)
ACM Trans. Comput. Syst.
, vol.20
, Issue.2
, pp. 125-160
-
-
Burgess, M.1
Haugerud, H.2
Straumsnes, S.3
Reitan, T.4
-
7
-
-
4544299163
-
Failure diagnosis using decision trees
-
0
-
M. Chen, A. X. Zheng, J. Lloyd, M. I. Jordan, and E. Brewer. Failure diagnosis using decision trees. Autonomic Computing, International Conference on, 0:36-43, 2004.
-
(2004)
Autonomic Computing, International Conference on
, pp. 36-43
-
-
Chen, M.1
Zheng, A.X.2
Lloyd, J.3
Jordan, M.I.4
Brewer, E.5
-
8
-
-
77954752832
-
Correlating instrumentation data to system states: A building block for automated diagnosis and control
-
Berkeley, CA, USA, USENIX Association
-
I. Cohen, M. Goldszmidt, T. Kelly, J. Symons, and J. S. Chase. Correlating instrumentation data to system states: a building block for automated diagnosis and control. In OSDI'04: Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation, pages 16-16, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
OSDI'04: Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation
, pp. 16-16
-
-
Cohen, I.1
Goldszmidt, M.2
Kelly, T.3
Symons, J.4
Chase, J.S.5
-
9
-
-
77954721326
-
-
J. Elonen. NanoHTTPD, 2007. http://elonen.iki.fi/code/nanohttpd/.
-
(2007)
NanoHTTPD
-
-
Elonen, J.1
-
10
-
-
33845564157
-
Tracking probabilistic correlation of monitoring data for fault detection in complex systems
-
June
-
Z. Guo, G. Jiang, H. Chen, and K. Yoshihira. Tracking probabilistic correlation of monitoring data for fault detection in complex systems. In Dependable Systems and Networks, 2006. DSN 2006. International Conference on, pages 259-268, June 2006.
-
(2006)
Dependable Systems and Networks, 2006. DSN 2006. International Conference on
, pp. 259-268
-
-
Guo, Z.1
Jiang, G.2
Chen, H.3
Yoshihira, K.4
-
11
-
-
33745486745
-
Multi-resolution abnormal trace detection using varied-length n-grams and automata
-
0
-
G. Jiang, H. Chen, C. Ungureanu, and K. Yoshihira. Multi-resolution abnormal trace detection using varied-length n-grams and automata. Autonomic Computing, International Conference on, 0:111-122, 2005.
-
(2005)
Autonomic Computing, International Conference on
, pp. 111-122
-
-
Jiang, G.1
Chen, H.2
Ungureanu, C.3
Yoshihira, K.4
-
12
-
-
70049087989
-
System monitoring with metric-correlation models: Problems and solutions
-
New York, NY, USA, ACM
-
M. Jiang, M. A. Munawar, T. Reidemeister, and P. A. Ward. System monitoring with metric-correlation models: problems and solutions. In ICAC '09: Proceedings of the 6th international conference on Autonomic computing, pages 13-22, New York, NY, USA, 2009. ACM.
-
(2009)
ICAC '09: Proceedings of the 6th International Conference on Autonomic Computing
, pp. 13-22
-
-
Jiang, M.1
Munawar, M.A.2
Reidemeister, T.3
Ward, P.A.4
-
13
-
-
0035062802
-
Java Management Extensions for application management
-
H. Kreger. Java Management Extensions for application management. Technology, 40(1), 2001.
-
(2001)
Technology
, vol.40
, Issue.1
-
-
Kreger, H.1
-
16
-
-
33745205813
-
Inferring Internet denial-of-service activity
-
D. Moore, C. Shannon, D. Brown, G. Voelker, and S. Savage. Inferring Internet denial-of-service activity. ACM Transactions on Computer Systems (TOCS), 24(2):139, 2006.
-
(2006)
ACM Transactions on Computer Systems (TOCS)
, vol.24
, Issue.2
, pp. 139
-
-
Moore, D.1
Shannon, C.2
Brown, D.3
Voelker, G.4
Savage, S.5
-
18
-
-
85006277702
-
Experiences building planetlab
-
November
-
L. Peterson, A. Bavier, M. Fiuczynski, and S. Muir. Experiences building planetlab. In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 351-366, November 2006.
-
(2006)
Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 351-366
-
-
Peterson, L.1
Bavier, A.2
Fiuczynski, M.3
Muir, S.4
-
19
-
-
85090433665
-
Snort - Lightweight intrusion detection for networks
-
Berkeley, CA, USA, USENIX Association
-
M. Roesch. Snort - lightweight intrusion detection for networks. In LISA '99: Proceedings of the 13th USENIX conference on System administration, pages 229-238, Berkeley, CA, USA, 1999. USENIX Association.
-
(1999)
LISA '99: Proceedings of the 13th USENIX Conference on System Administration
, pp. 229-238
-
-
Roesch, M.1
-
20
-
-
0008572085
-
No Time for DOWNTIME - IT Managers feel the heat to prevent outages that can cost millions of dollars
-
T. Sweeney. No Time for DOWNTIME - IT Managers feel the heat to prevent outages that can cost millions of dollars. InternetWeek, 807, 2000.
-
(2000)
InternetWeek
, vol.807
-
-
Sweeney, T.1
-
22
-
-
0002067431
-
Netstat: A network-based intrusion detection system
-
G. Vigna and R. A. Kemmerer. Netstat: a network-based intrusion detection system. J. Comput. Secur., 7(1):37-71, 1999.
-
(1999)
J. Comput. Secur.
, vol.7
, Issue.1
, pp. 37-71
-
-
Vigna, G.1
Kemmerer, R.A.2
-
23
-
-
27544488141
-
Ensembles of models for automated diagnosis of system performance problems
-
0
-
S. Zhang, I. Cohen, M. Goldszmidt, J. Symons, and A. Fox. Ensembles of models for automated diagnosis of system performance problems. Dependable Systems and Networks, International Conference on, 0:644-653, 2005.
-
(2005)
Dependable Systems and Networks, International Conference on
, pp. 644-653
-
-
Zhang, S.1
Cohen, I.2
Goldszmidt, M.3
Symons, J.4
Fox, A.5
-
24
-
-
70149111040
-
Self-correlating predictive information tracking for large-scale production systems
-
New York, NY, USA, ACM
-
Y. Zhao, Y. Tan, Z. Gong, X. Gu, and M. Wamboldt. Self-correlating predictive information tracking for large-scale production systems. In ICAC '09: Proceedings of the 6th international conference on Autonomic computing, pages 33-42, New York, NY, USA, 2009. ACM.
-
(2009)
ICAC '09: Proceedings of the 6th International Conference on Autonomic Computing
, pp. 33-42
-
-
Zhao, Y.1
Tan, Y.2
Gong, Z.3
Gu, X.4
Wamboldt, M.5
|