-
1
-
-
0004309520
-
-
Tech. rep. 98-17, Department of Computer Engineering, Chalmers University of Technology
-
AXELSSON, S. 1998. Research in intrusion-detection systems: A survey. Tech. rep. 98-17, Department of Computer Engineering, Chalmers University of Technology.
-
(1998)
Research in Intrusion-detection Systems: A Survey
-
-
Axelsson, S.1
-
2
-
-
27144528230
-
Storage-based intrusion detection for storage area networks (SANs)
-
IEEE Computer Society
-
BANIKAZEMI, M., POFF, D., AND ABALI, B. 2005. Storage-based intrusion detection for storage area networks (SANs). In Proceedings of the IEEE Symposium on Mass Storage Systems. IEEE Computer Society, 118-127.
-
(2005)
Proceedings of the IEEE Symposium on Mass Storage Systems
, pp. 118-127
-
-
Banikazemi, M.1
Poff, D.2
Abali, B.3
-
3
-
-
0030092390
-
Checking for race conditions in file accesses
-
BISHOP, M. AND DILGER, M. 1996. Checking for race conditions in file accesses. Comput. Syst. 9, 2, 131-152.
-
(1996)
Comput. Syst.
, vol.9
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
4
-
-
70349270845
-
Rootkit-resistant disks
-
ACM
-
BUTLER, K. R. B., MCLAUGHLIN, S., AND MCDANIEL, P. D. 2008. Rootkit-resistant disks. In Proceedings of the Conference on Computer and Communications Security (CCS'08). ACM, 403-416.
-
(2008)
Proceedings of the Conference on Computer and Communications Security (CCS'08)
, pp. 403-416
-
-
Butler, K.R.B.1
McLaughlin, S.2
McDaniel, P.D.3
-
11
-
-
0345914404
-
What are MACtimes?
-
FARMER, D. 2000. What are MACtimes? Dr. Dobb's J. 25, 10, 68-74.
-
(2000)
Dr. Dobb's J.
, vol.25
, Issue.10
, pp. 68-74
-
-
Farmer, D.1
-
12
-
-
0029716418
-
A sense of self for UNIX processes
-
IEEE
-
FORREST, S., HOFMEYR, S. A., SOMAYAJI, A., AND LONGSTAFF, T. A. 1996. A sense of self for UNIX processes. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 120-128.
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
14
-
-
20444487985
-
-
Tech. rep. CMU-CS-03-109, Carnegie Mellon University
-
GANGER, G. R., ECONOMOU, G., AND BIELSKI, S. M. 2003. Finding and containing enemies within the walls with self-securing network interfaces. Tech. rep. CMU-CS-03-109, Carnegie Mellon University.
-
(2003)
Finding and Containing Enemies Within the Walls with Self-securing Network Interfaces
-
-
Ganger, G.R.1
Economou, G.2
Bielski, S.M.3
-
16
-
-
0346339931
-
A cost-effective, high-bandwidth storage architecture
-
GIBSON, G. A., NAGLE, D. F., AMIRI, K., BUTLER, J., CHANG, F. W., GOBIOFF, H., HARDIN, C., RIEDEL, E., ROCHBERG, D., AND ZELENKA, J. 1998. A cost-effective, high-bandwidth storage architecture. SIGPLAN Not. 33, 11, 92-103.
-
(1998)
SIGPLAN Not.
, vol.33
, Issue.11
, pp. 92-103
-
-
Gibson, G.A.1
Nagle, D.F.2
Amiri, K.3
Butler, J.4
Chang, F.W.5
Gobioff, H.6
Hardin, C.7
Riedel, E.8
Rochberg, D.9
Zelenka, J.10
-
19
-
-
0023964787
-
SCALE AND PERFORMANCE IN A DISTRIBUTED FILE SYSTEM.
-
DOI 10.1145/35037.35059
-
HOWARD, J. H., KAZAR, M. L., MENEES, S. G., NICHOLS, D. A., SATYANARAYANAN, M., SIDEBOTHAM, R. N., AND WEST, M. J. 1988. Scale and performance in a distributed file system. ACM Trans. Comput. Syst. 6, 1, 51-81. (Pubitemid 18574134)
-
(1988)
ACM Transactions on Computer Systems
, vol.6
, Issue.1
, pp. 51-81
-
-
Howard John, H.1
Kazar Michael, L.2
Menees Sherri, G.3
Nichols David4
Satyanarayanan, M.5
Sidebotham Robert, N.6
West Michael, J.7
-
20
-
-
0030107437
-
Components for software fault-tolerance and rejuvenation
-
HUANG, Y. N., KINTALA, C. M. R., BERNSTEIN, L., AND WANG, Y. M. 1996. Components for software fault-tolerance and rejuvenation. AT&T Bell Lab. Tech. J. 75, 2, 29-37.
-
(1996)
AT&T Bell Lab. Tech. J.
, vol.75
, Issue.2
, pp. 29-37
-
-
Huang, Y.N.1
Kintala, C.M.R.2
Bernstein, L.3
Wang, Y.M.4
-
23
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
IEEE
-
KO, C., RUSCHITZKA, M., AND LEVITT, K. 1997. Execution monitoring of security-critical programs in distributed systems: A specification-based approach. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 175-187.
-
(1997)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 175-187
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
26
-
-
35048812834
-
Intrusion confinement by isolation in information systems
-
IFIP
-
LIU, P., JAJODIA, S., AND MCCOLLUM, C. D. 2000. Intrusion confinement by isolation in information systems. In Proceedings of the IFIP Working Conference on Database Security. IFIP, 3-18.
-
(2000)
Proceedings of the IFIP Working Conference on Database Security
, pp. 3-18
-
-
Liu, P.1
Jajodia, S.2
McCollum, C.D.3
-
28
-
-
78651380345
-
-
NFR 2002. Nfr security. http://www.nfr.net/.
-
(2002)
Nfr Security
-
-
-
29
-
-
78651387601
-
-
PACKETSTORM 2009. Packet storm security. http://www.packetstormsecurity. org/.
-
(2009)
Packetstorm
-
-
-
32
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
USENIX Association
-
PAXSON, V. 1998. Bro: A system for detecting network intruders in real-time. In Proceedings of the USENIX Security Symposium. USENIX Association, 31-51.
-
(1998)
Proceedings of the USENIX Security Symposium
, pp. 31-51
-
-
Paxson, V.1
-
33
-
-
48649085344
-
Secure and flexible monitoring of virtual machines
-
IEEE
-
PAYNE, B. D., DE A. CARBONE, M. D. P., AND LEE, W. 2007. Secure and flexible monitoring of virtual machines. In Proceedings of the Computer Security Applications Conference (ACSAC'07). IEEE, 385-397.
-
(2007)
Proceedings of the Computer Security Applications Conference (ACSAC'07)
, pp. 385-397
-
-
Payne, B.D.1
De, A.2
Carbone, M.D.P.3
Lee, W.4
-
34
-
-
85077741011
-
Storage-based intrusion detection:Watching storage activity for suspicious behavior
-
PENNINGTON, A. G., STRUNK, J. D., GRIFFIN, J. L., SOULES, C. A.N., GOODSON, G. R., AND GANGER, G. R. 2003. Storage-based intrusion detection:Watching storage activity for suspicious behavior. In Proceedings of the USENIX Security Symposium.
-
(2003)
Proceedings of the USENIX Security Symposium
-
-
Pennington, A.G.1
Strunk, J.D.2
Griffin, J.L.3
Soules, A.C.N.4
Goodson, G.R.5
Ganger, G.R.6
-
39
-
-
85021950441
-
Secure audit logs to support computer forensics
-
SCHNEIER, B. AND KELSEY, J. 1999. Secure audit logs to support computer forensics. ACM Trans. Inf. Syst. Secur. 2, 2, 159-176.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.2
, pp. 159-176
-
-
Schneier, B.1
Kelsey, J.2
-
40
-
-
85077206237
-
Semantically smart disk systems
-
USENIX Association
-
SIVATHANU, M., PRABHAKARAN, V., POPOVICI, F. I., DENEHY, T. E., ARPACI-DUSSEAU, A. C., AND ARPACI-DUSSEAU, R. H. 2003. Semantically smart disk systems. In Proceedings of the Conference on File and Storage Technologies. USENIX Association, 73-88.
-
(2003)
Proceedings of the Conference on File and Storage Technologies
, pp. 73-88
-
-
Sivathanu, M.1
Prabhakaran, V.2
Popovici, F.I.3
Denehy, T.E.4
Arpaci-Dusseau, A.C.5
Arpaci-Dusseau, R.H.6
-
42
-
-
84978374045
-
Self-securing storage: Protecting data in compromised systems
-
USENIX Association
-
STRUNK, J. D., GOODSON, G. R., SCHEINHOLTZ, M. L., SOULES, C. A. N., AND GANGER, G. R. 2000. Self-securing storage: Protecting data in compromised systems. In Proceedings of the Symposium on Operating Systems Design and Implementation. USENIX Association, 165-180.
-
(2000)
Proceedings of the Symposium on Operating Systems Design and Implementation
, pp. 165-180
-
-
Strunk, J.D.1
Goodson, G.R.2
Scheinholtz, M.L.3
Soules, C.A.N.4
Ganger, G.R.5
-
43
-
-
85084164828
-
Virtualizing I/O devices on vmware workstation's hosted virtual machine monitor
-
USENIX Association
-
SUGERMAN, J., VENKITACHALAM, G., AND LIM, B.-H. 2001. Virtualizing I/O devices on vmware workstation's hosted virtual machine monitor. In Proceedings of the USENIX Annual Technical Conference. USENIX Association, 1-14.
-
(2001)
Proceedings of the USENIX Annual Technical Conference
, pp. 1-14
-
-
Sugerman, J.1
Venkitachalam, G.2
Lim, B.-H.3
-
45
-
-
0001540690
-
Managing update conflicts in Bayou, a weakly connected replicated storage system
-
TERRY, D. B., THEIMER, M.M., PETERSEN, K.,DEMERS, A. J., SPREITZER, M. J., AND HAUSER, C. H. 1995. Managing update conflicts in Bayou, a weakly connected replicated storage system. Oper. Syst. Rev. 29, 5.
-
(1995)
Oper. Syst. Rev.
, vol.29
, pp. 5
-
-
Terry, D.B.1
Theimer, M.M.2
Petersen, K.3
Demers, A.J.4
Spreitzer, M.J.5
Hauser, C.H.6
-
46
-
-
78651383686
-
-
TRIPWIRE. 2002. Tripwire open souce 2.3.1. http://ftp4.sf.net/ sourceforge/tripwire/tripwire-2.3.1-2.tar.gz.
-
(2002)
Tripwire Open Souce 2.3.1.
-
-
-
47
-
-
0034832697
-
Analysis and implementation of software rejuvenation in cluster systems
-
VAIDYANATHAN, K., HARPER, R. E., HUNTER, S. W., AND TRIVEDI, K. S. 2002. Analysis and implementation of software rejuvenation in cluster systems. Perform. Eval. Rev. 29, 1, 62-71.
-
(2002)
Perform. Eval. Rev.
, vol.29
, Issue.1
, pp. 62-71
-
-
Vaidyanathan, K.1
Harper, R.E.2
Hunter, S.W.3
Trivedi, K.S.4
-
49
-
-
77954517653
-
Secure coprocessorbased intrusion detection
-
ACM
-
ZHANG, X., VAN DOORN, L., JAEGER, T., PEREZ, R., AND SAILER, R. 2002. Secure coprocessorbased intrusion detection. In Proceedings of the ACM SIGOPS European Workshop. ACM.
-
(2002)
Proceedings of the ACM SIGOPS European Workshop
-
-
Zhang, X.1
Van Doorn, L.2
Jaeger, T.3
Perez, R.4
Sailer, R.5
|