-
1
-
-
84858290417
-
-
Stuxnet worm causes industry concern for security firms, Mass High Tech, Boston, Massachusetts, October 19
-
R. Brown, Stuxnet worm causes industry concern for security firms, Mass High Tech, Boston, Massachusetts, October 19, 2010 http://www.masshightech.com/stories/2010/10/18/daily19-Stuxnet-worm-causes-industry-concern-for-security-firms.html.
-
(2010)
-
-
Brown, R.1
-
2
-
-
84858287019
-
-
Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), ICS-ALERT-10-301-01 - Control System Internet Accessibility, Department of Homeland Security, Washington, DC, October 28
-
Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), ICS-ALERT-10-301-01 - Control System Internet Accessibility, Department of Homeland Security, Washington, DC, October 28, 2010 http://www.us-cert.gov/control_systems/pdf/ICS-Alert-10-301-01.pdf.
-
(2010)
-
-
-
3
-
-
84858297741
-
-
US Air Force Chief Scientist, Report on Technology Horizons: A Vision for Air Force Science and Technology During 2010-2030, Volume 1, Technical Report AF/ST-TR-10-01-PR, Department of the Air Force, Washington, DC
-
US Air Force Chief Scientist, Report on Technology Horizons: A Vision for Air Force Science and Technology During 2010-2030, Volume 1, Technical Report AF/ST-TR-10-01-PR, Department of the Air Force, Washington, DC, 2010.
-
(2010)
-
-
-
4
-
-
84858276207
-
-
National Security Council, Cybersecurity Progress after President Obama's Address, The White House, Washington, DC, July 14
-
National Security Council, Cybersecurity Progress after President Obama's Address, The White House, Washington, DC, July 14, 2010.
-
(2010)
-
-
-
5
-
-
31544436627
-
Denial-of-service attack detection techniques
-
Carl G., Kesidis G., Brooks R., Rai S. Denial-of-service attack detection techniques. IEEE Internet Computing 2006, 10(1):82-89.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.3
Rai, S.4
-
6
-
-
84858297739
-
-
Virtualization in Linux, OpenVZ
-
K. Kolyshkin, Virtualization in Linux, OpenVZ, 2006 ftp://openvz.org/doc/openvz-intro.pdf.
-
(2006)
-
-
Kolyshkin, K.1
-
7
-
-
0029713612
-
CoCheck: checkpointing and process migration for MPI
-
in: Proceedings of the Tenth International Parallel Processing Symposium
-
G. Stellner, CoCheck: checkpointing and process migration for MPI, in: Proceedings of the Tenth International Parallel Processing Symposium, 1996, pp. 526-531.
-
(1996)
, pp. 526-531
-
-
Stellner, G.1
-
8
-
-
0038040085
-
Automated application-level checkpointing of MPI programs
-
Bronevetsky G., Marques D., Pingali K., Stodghill P. Automated application-level checkpointing of MPI programs. ACM SIGPLAN Notices 2003, 38(10):84-94.
-
(2003)
ACM SIGPLAN Notices
, vol.38
, Issue.10
, pp. 84-94
-
-
Bronevetsky, G.1
Marques, D.2
Pingali, K.3
Stodghill, P.4
-
9
-
-
84858276210
-
-
HDF Group, HDF4 Reference Manual, Champaign, Illinois
-
HDF Group, HDF4 Reference Manual, Champaign, Illinois, 2010, ftp://hdfgroup.org/HDF/Documentation/HDF4.2.5/HDF425_RefMan.pdf.
-
(2010)
-
-
-
10
-
-
84858276209
-
-
lxc Linux Containers, lxc man pages.
-
lxc Linux Containers, lxc man pages.
-
-
-
-
11
-
-
84858290420
-
-
Parallels, Clustering in Parallels Virtuozzo-Based Systems, White Paper, Renton, Washington
-
Parallels, Clustering in Parallels Virtuozzo-Based Systems, White Paper, Renton, Washington, 2009.
-
(2009)
-
-
-
12
-
-
42149132499
-
Securing FreeBSD using jail
-
Sarmiento E. Securing FreeBSD using jail. System Administration 2001, 10(5):31-37.
-
(2001)
System Administration
, vol.10
, Issue.5
, pp. 31-37
-
-
Sarmiento, E.1
-
13
-
-
84858290418
-
-
Virtualization with KVM, Linux Journal, February 1
-
I. Habib, Virtualization with KVM, Linux Journal, February 1, 2008 http://www.linuxjournal.com/article/9764.
-
(2008)
-
-
Habib, I.1
-
14
-
-
72649101296
-
CPPC: a compiler-assisted tool for portable checkpointing of message-passing applications
-
Rodriguez G., Martin M., Gonzalez P., Tourino J., Doallo R. CPPC: a compiler-assisted tool for portable checkpointing of message-passing applications. Concurrency and Computation: Practice and Experience 2010, 22(6):749-766.
-
(2010)
Concurrency and Computation: Practice and Experience
, vol.22
, Issue.6
, pp. 749-766
-
-
Rodriguez, G.1
Martin, M.2
Gonzalez, P.3
Tourino, J.4
Doallo, R.5
-
15
-
-
35048854568
-
Cetus - an extensible compiler infrastructure for source-to-source transformation
-
in: Proceedings of the Sixteenth International Workshop on Languages and Compilers for Parallel Computing
-
S. Lee, T. Johnson, R. Eigenmann, Cetus - an extensible compiler infrastructure for source-to-source transformation, in: Proceedings of the Sixteenth International Workshop on Languages and Compilers for Parallel Computing, 2003, pp. 539-553.
-
(2003)
, pp. 539-553
-
-
Lee, S.1
Johnson, T.2
Eigenmann, R.3
-
16
-
-
33646158627
-
-
Prentice Hall, Upper Saddle River, New Jersey
-
Smart J., Hock K., Csomor S. Cross-Platform GUI Programming with wxWidgets 2005, Prentice Hall, Upper Saddle River, New Jersey.
-
(2005)
Cross-Platform GUI Programming with wxWidgets
-
-
Smart, J.1
Hock, K.2
Csomor, S.3
-
17
-
-
84858297738
-
-
Trusted Computing Group, TPM Main Specification Level 2, Version 1.2, Revision 116, Beaverton, Oregon
-
Trusted Computing Group, TPM Main Specification Level 2, Version 1.2, Revision 116, Beaverton, Oregon, 2011, http://www.trustedcomputinggroup.org/resources/tpm_main_specification.
-
(2011)
-
-
-
18
-
-
14844295011
-
Direct anonymous attestation
-
in: Proceedings of the Eleventh ACM Conference on Computer and Communications Security
-
E. Brickell, J. Camenisch, L. Chen, Direct anonymous attestation, in: Proceedings of the Eleventh ACM Conference on Computer and Communications Security, 2004, pp. 132-145.
-
(2004)
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
19
-
-
77950793246
-
Modeling modern network attacks and countermeasures using attack graphs
-
in: Proceedings of the Annual Computer Security Applications Conference
-
K. Ingols, M. Chu, R. Lippmann, S. Webster, S. Boyer, Modeling modern network attacks and countermeasures using attack graphs, in: Proceedings of the Annual Computer Security Applications Conference, 2009, pp. 117-126.
-
(2009)
, pp. 117-126
-
-
Ingols, K.1
Chu, M.2
Lippmann, R.3
Webster, S.4
Boyer, S.5
-
20
-
-
12444331951
-
CLIP: a checkpointing tool for message passing parallel programs
-
in: Proceedings of the ACM/IEEE Conference on Supercomputing
-
Y. Chen, K. Li, J. Plank, CLIP: a checkpointing tool for message passing parallel programs, in: Proceedings of the ACM/IEEE Conference on Supercomputing, 1997, p. 33.
-
(1997)
, pp. 33
-
-
Chen, Y.1
Li, K.2
Plank, J.3
-
21
-
-
85059766484
-
Live migration of virtual machines
-
in: Proceedings of the Second Conference on Symposium on Networked Systems Design and Implementation
-
C. Clark, K. Fraser, S. Hand, J. Hansen, E. Jul, C. Limpach, I. Pratt, A. Warfield, Live migration of virtual machines, in: Proceedings of the Second Conference on Symposium on Networked Systems Design and Implementation, vol. 2, 2005, pp. 273-286.
-
(2005)
, vol.2
, pp. 273-286
-
-
Clark, C.1
Fraser, K.2
Hand, S.3
Hansen, J.4
Jul, E.5
Limpach, C.6
Pratt, I.7
Warfield, A.8
-
22
-
-
84858287021
-
-
Intrusion tolerance to mitigate attacks that persist presented at the Secure and Resilient Cyber Architectures Conference
-
A. Sood, Intrusion tolerance to mitigate attacks that persist presented at the Secure and Resilient Cyber Architectures Conference, 2010.
-
(2010)
-
-
Sood, A.1
-
23
-
-
70449380100
-
Securing web servers using self cleansing intrusion tolerance SCIT
-
in: Proceedings of the Second International Conference on Dependability
-
A. Bangalore, A. Sood, Securing web servers using self cleansing intrusion tolerance SCIT, in: Proceedings of the Second International Conference on Dependability, 2009, pp. 60-65.
-
(2009)
, pp. 60-65
-
-
Bangalore, A.1
Sood, A.2
-
24
-
-
77952628807
-
Incorruptible self cleansing intrusion tolerance and its application to DNS security
-
Huang Y., Arsenault D., Sood A. Incorruptible self cleansing intrusion tolerance and its application to DNS security. Journal of Networks 2006, 1(5):21-30.
-
(2006)
Journal of Networks
, vol.1
, Issue.5
, pp. 21-30
-
-
Huang, Y.1
Arsenault, D.2
Sood, A.3
-
25
-
-
70449389986
-
Automating intrusion response via virtualization for realizing uninterruptible web services
-
in: Proceedings of the Eighth IEEE International Symposium on Network Computing and Applications
-
Y. Huang, A. Ghosh, Automating intrusion response via virtualization for realizing uninterruptible web services, in: Proceedings of the Eighth IEEE International Symposium on Network Computing and Applications, 2009, pp. 114-117.
-
(2009)
, pp. 114-117
-
-
Huang, Y.1
Ghosh, A.2
-
26
-
-
77956571453
-
A security evaluation of a novel resilient web serving architecture: lessons learned through industry/academia collaboration
-
in: Proceedings of the International Conference on Dependable Systems and Networks Workshops
-
Y. Huang, A. Ghosh, T. Bracewell, B. Mastropietro, A security evaluation of a novel resilient web serving architecture: lessons learned through industry/academia collaboration, in: Proceedings of the International Conference on Dependable Systems and Networks Workshops, 2010, pp. 188-193.
-
(2010)
, pp. 188-193
-
-
Huang, Y.1
Ghosh, A.2
Bracewell, T.3
Mastropietro, B.4
-
27
-
-
84969348146
-
Storage: high-availability file server with heartbeat
-
Blackmon S., Nguyen J. Storage: high-availability file server with heartbeat. System Administration 2001, 10(9):24-32.
-
(2001)
System Administration
, vol.10
, Issue.9
, pp. 24-32
-
-
Blackmon, S.1
Nguyen, J.2
-
28
-
-
12444259113
-
A high-availability clustering architecture with data integrity guarantees
-
in: Proceedings of the IEEE International Conference on Cluster Computing
-
R. Rabbat, T. McNeal, T. Burke, A high-availability clustering architecture with data integrity guarantees, in: Proceedings of the IEEE International Conference on Cluster Computing, 2001. pp. 178-182.
-
(2001)
, pp. 178-182
-
-
Rabbat, R.1
McNeal, T.2
Burke, T.3
|