-
1
-
-
77955172671
-
Sinfp, unification of active and passive operating system fingerprinting
-
P. Auffret, "Sinfp, unification of active and passive operating system fingerprinting," Jour. Comp. Virology, vol. 6, no. 3, pp. 197-205, 2010.
-
(2010)
Jour. Comp. Virology
, vol.6
, Issue.3
, pp. 197-205
-
-
Auffret, P.1
-
4
-
-
78650162164
-
The limits of automatic os fingerprint generation
-
D. Richardson, S. Gribble, and T. Kohno, "The limits of automatic os fingerprint generation," in ACM workshop on Artificial intelligence and security (AISec), 2010, pp. 24-34.
-
ACM Workshop on Artificial Intelligence and Security (AISec), 2010
, pp. 24-34
-
-
Richardson, D.1
Gribble, S.2
Kohno, T.3
-
6
-
-
77950347409
-
A view of cloud computing
-
April
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A view of cloud computing," Commun. ACM, vol. 53, pp. 50-58, April 2010.
-
(2010)
Commun. ACM
, vol.53
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
7
-
-
57349121962
-
Power-aware dynamic placement of hpc applications
-
A. Verma, P. Ahuja, and A. Neogi, "Power-aware dynamic placement of hpc applications," in Proceedings of the annual international conference on Supercomputing, 2008, pp. 175-184.
-
Proceedings of the Annual International Conference on Supercomputing, 2008
, pp. 175-184
-
-
Verma, A.1
Ahuja, P.2
Neogi, A.3
-
8
-
-
78650158728
-
Determinating timing channels in compute clouds
-
A. Aviram, S. Hu, B. Ford, and R. Gummadi, "Determinating timing channels in compute clouds," in Proceedings of ACM workshop on Cloud computing security workshop, 2010, pp. 103-108.
-
Proceedings of ACM Workshop on Cloud Computing Security Workshop, 2010
, pp. 103-108
-
-
Aviram, A.1
Hu, S.2
Ford, B.3
Gummadi, R.4
-
9
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," in Proc. of ACM Conference on Computer and Communications Security (CCS), 2009.
-
Proc. of ACM Conference on Computer and Communications Security (CCS), 2009
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
12
-
-
77957958461
-
Difference engine: Harnessing memory redundancy in virtual machines
-
D. Gupta, S. Lee, M. Vrable, S. Savage, A. Snoeren, G. Varghese, G. Voelker, and A. Vahdat, "Difference engine: harnessing memory redundancy in virtual machines," Commun. ACM, vol. 53, no. 10, pp. 85-93, 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.10
, pp. 85-93
-
-
Gupta, D.1
Lee, S.2
Vrable, M.3
Savage, S.4
Snoeren, A.5
Varghese, G.6
Voelker, G.7
Vahdat, A.8
-
13
-
-
78649461650
-
Exploiting data deduplication to accelerate live virtual machine migration
-
X. Zhang, Z. Huo, J. Ma, and D. Meng, "Exploiting data deduplication to accelerate live virtual machine migration," in IEEE International Conference on Cluster Computing, 2010, pp. 88-96.
-
IEEE International Conference on Cluster Computing, 2010
, pp. 88-96
-
-
Zhang, X.1
Huo, Z.2
Ma, J.3
Meng, D.4
-
14
-
-
77954900838
-
Increasing memory density by using ksm
-
A. Arcangeli, I. Eidus, and C. Wright, "Increasing memory density by using ksm," in Linux Symposium, 2009, pp. 19-28.
-
Linux Symposium, 2009
, pp. 19-28
-
-
Arcangeli, A.1
Eidus, I.2
Wright, C.3
-
15
-
-
79957840719
-
Memory deduplication as a threat to the guest os
-
K. Suzaki, K. Iijima, T. Yagi, and C. Artho, "Memory deduplication as a threat to the guest os," in Proceedings of the Fourth European Workshop on System Security, 2011, pp. 1:1-1:6.
-
Proceedings of the Fourth European Workshop on System Security, 2011
-
-
Suzaki, K.1
Iijima, K.2
Yagi, T.3
Artho, C.4
-
16
-
-
84862967446
-
Understanding memory resource management in vmware esx 4.1
-
VMWare
-
VMWare, "Understanding memory resource management in vmware esx 4.1," VMware vSphere 4.1 Documentation, 2010.
-
(2010)
VMware VSphere 4.1 Documentation
-
-
-
17
-
-
84862912113
-
-
Microsoft Developer Network, "timegettime," http://msdn.microsoft.com/en-us/library/ms713418(VS.85).aspx, 2010.
-
(2010)
Timegettime
-
-
-
22
-
-
74049131554
-
Resource management for isolation enhanced cloud services
-
H. Raj, R. Nathuji, A. Singh, and P. England, "Resource management for isolation enhanced cloud services," in ACM Cloud Computing Security Workshop, 2009, pp. 77-84.
-
ACM Cloud Computing Security Workshop, 2009
, pp. 77-84
-
-
Raj, H.1
Nathuji, R.2
Singh, A.3
England, P.4
-
23
-
-
80051997870
-
Companies slowly join cloud computing
-
18 April
-
B. Stone and A. Vance, "Companies slowly join cloud computing,"New York Times, 18 April, 2010.
-
(2010)
New York Times
-
-
Stone, B.1
Vance, A.2
-
24
-
-
80052008862
-
Homealone: Co-residency detection in the cloud via side-channel analysis
-
Y. Zhang, A. Juels, A. Oprea, and M. K. Reiter, "Homealone: Co-residency detection in the cloud via side-channel analysis,"in Proceedings of the IEEE Symposium on Security and Privacy (Oakland), 2011, pp. 313-328.
-
Proceedings of the IEEE Symposium on Security and Privacy (Oakland), 2011
, pp. 313-328
-
-
Zhang, Y.1
Juels, A.2
Oprea, A.3
Reiter, M.K.4
|