-
2
-
-
84883472359
-
Server operational cost optimization for cloud computing service providers over a time horizon
-
Proceedings of the 11th USENIX conference on Hot topics in management of internet, cloud, and enterprise networks and services, ser.
-
H. Qian and D. Medhi, "Server operational cost optimization for cloud computing service providers over a time horizon," in Proceedings of the 11th USENIX conference on Hot topics in management of internet, cloud, and enterprise networks and services, ser. HotICE'11, 2011.
-
(2011)
HotICE'11
-
-
Qian, H.1
Medhi, D.2
-
4
-
-
77949441598
-
Stealthy malware detection and monitoring through VMM-based "out-of-the-box" semantic view reconstruction
-
Mar.
-
X. Jiang, X. Wang, and D. Xu, "Stealthy malware detection and monitoring through VMM-based "out-of-the-box" semantic view reconstruction," ACM Transaction on Information and System Securirty, vol. 13, no. 2, pp. 12:1-12:28, Mar. 2010.
-
(2010)
ACM Transaction on Information and System Securirty
, vol.13
, Issue.2
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
5
-
-
38149053957
-
Out-of-the-Box monitoring of VM-Based high-interaction honeypots
-
Recent Advances in Intrusion Detection, ser. C. Kruegel, R. Lippmann, and A. Clark, Eds. Springer Berlin Heidelberg, Jan.
-
X. Jiang and X. Wang, "Out-of-the-Box monitoring of VM-Based high-interaction honeypots," in Recent Advances in Intrusion Detection, ser. Lecture Notes in Computer Science, C. Kruegel, R. Lippmann, and A. Clark, Eds. Springer Berlin Heidelberg, Jan. 2007, no. 4637, pp. 198-218.
-
(2007)
Lecture Notes in Computer Science
, Issue.4637
, pp. 198-218
-
-
Jiang, X.1
Wang, X.2
-
6
-
-
84897585209
-
NICE: Network intrusion detection and countermeasure selection in virtual network systems
-
Jul.
-
C.-J. Chung, P. Khatkar, T. Xing, J. Lee, and D. Huang, "NICE: network intrusion detection and countermeasure selection in virtual network systems," IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 4, pp. 198-211, Jul. 2013.
-
(2013)
IEEE Transactions on Dependable and Secure Computing
, vol.10
, Issue.4
, pp. 198-211
-
-
Chung, C.-J.1
Khatkar, P.2
Xing, T.3
Lee, J.4
Huang, D.5
-
9
-
-
70349459587
-
Framework for zombie detection using neural networks
-
P. Salvador, A. Nogueira, U. Franca, and R. Valadas, "Framework for zombie detection using neural networks," in Fourth International Conference on Internet Monitoring and Protection, 2009. ICIMP '09, 2009, pp. 14-20.
-
Fourth International Conference on Internet Monitoring and Protection, 2009. ICIMP '09, 2009
, pp. 14-20
-
-
Salvador, P.1
Nogueira, A.2
Franca, U.3
Valadas, R.4
-
10
-
-
84894039099
-
Antfarm: Tracking processes in a virtual machine environment
-
S. T. Jones, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau, "Antfarm: Tracking processes in a virtual machine environment," in Proceedings of the USENIX Annual Technical Conference, 2006, pp. 1-4.
-
Proceedings of the USENIX Annual Technical Conference, 2006
, pp. 1-4
-
-
Jones, S.T.1
Arpaci-Dusseau, A.C.2
Arpaci-Dusseau, R.H.3
-
11
-
-
77952336652
-
VMM-based hidden process detection and identification using lycosid
-
Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, ser. New York, NY, USA: ACM
-
S. T. Jones, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau, "VMM-based hidden process detection and identification using lycosid," in Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, ser. VEE '08. New York, NY, USA: ACM, 2008, pp. 91-100.
-
(2008)
VEE '08
, pp. 91-100
-
-
Jones, S.T.1
Arpaci-Dusseau, A.C.2
Arpaci-Dusseau, R.H.3
-
12
-
-
84866766411
-
Maitland: Lighter-weight VM introspection to support cyber-security in the cloud
-
C. Benninger, S. Neville, Y. Yazir, C. Matthews, and Y. Coady, "Maitland: Lighter-weight VM introspection to support cyber-security in the cloud," in 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), Jun. 2012, pp. 471-478.
-
2012 IEEE 5th International Conference on Cloud Computing (CLOUD), Jun. 2012
, pp. 471-478
-
-
Benninger, C.1
Neville, S.2
Yazir, Y.3
Matthews, C.4
Coady, Y.5
-
13
-
-
80755144012
-
Process out-grafting: An efficient "out-of-VM" approach for fine-grained process execution monitoring
-
Proceedings of the 18th ACM conference on Computer and communications security, ser. New York, NY, USA: ACM
-
D. Srinivasan, Z. Wang, X. Jiang, and D. Xu, "Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring," in Proceedings of the 18th ACM conference on Computer and communications security, ser. CCS '11. New York, NY, USA: ACM, 2011, pp. 363-374.
-
(2011)
CCS '11
, pp. 363-374
-
-
Srinivasan, D.1
Wang, Z.2
Jiang, X.3
Xu, D.4
-
14
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
IEEE
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing, "Automated generation and analysis of attack graphs," in 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. IEEE, 2002, pp. 273-284.
-
(2002)
2002 IEEE Symposium on Security and Privacy, 2002. Proceedings
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
16
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
Proceedings of the 9th ACM conference on Computer and communications security, ser. New York, NY, USA: ACM
-
P. Ammann, D. Wijesekera, and S. Kaushik, "Scalable, graph-based network vulnerability analysis," in Proceedings of the 9th ACM conference on Computer and communications security, ser. CCS '02. New York, NY, USA: ACM, 2002, pp. 217-224.
-
(2002)
CCS '02
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
17
-
-
34748883109
-
Topological analysis of network attack vulnerability
-
Proceedings of the 2nd ACM symposium on Information, computer and communications security, ser. New York, NY, USA: ACM
-
S. Jajodia, "Topological analysis of network attack vulnerability," in Proceedings of the 2nd ACM symposium on Information, computer and communications security, ser. ASIACCS '07. New York, NY, USA: ACM, 2007, pp. 2-2.
-
(2007)
ASIACCS '07
, pp. 2-2
-
-
Jajodia, S.1
-
18
-
-
85076884574
-
MulVAL: A logic-based network security analyzer
-
Berkeley, CA, USA: USENIX Association
-
X. Ou, S. Govindavajhala, and A. W. Appel, "MulVAL: a logic-based network security analyzer," in Proceedings of the 14th conference on USENIX Security Symposium - Volume 14. Berkeley, CA, USA: USENIX Association, 2005, pp. 8-8.
-
(2005)
Proceedings of the 14th Conference on USENIX Security Symposium
, vol.14
, pp. 8-8
-
-
Ou, X.1
Govindavajhala, S.2
Appel, A.W.3
-
19
-
-
80052713647
-
A hierarchical model to evaluate quality of experience of online services hosted by cloud computing
-
H. Qian, D. Medhi, and T. Trivedi, "A hierarchical model to evaluate quality of experience of online services hosted by cloud computing," in 2011 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2011, pp. 105-112.
-
2011 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2011
, pp. 105-112
-
-
Qian, H.1
Medhi, D.2
Trivedi, T.3
-
20
-
-
34547239511
-
A scalable approach to attack graph generation
-
Proceedings of the 13th ACM conference on Computer and communications security, ser. New York, NY, USA: ACM
-
X. Ou, W. F. Boyer, and M. A. McQueen, "A scalable approach to attack graph generation," in Proceedings of the 13th ACM conference on Computer and communications security, ser. CCS '06. New York, NY, USA: ACM, 2006, pp. 336-345.
-
(2006)
CCS '06
, pp. 336-345
-
-
Ou, X.1
Boyer, W.F.2
McQueen, M.A.3
-
22
-
-
84872957282
-
-
Online. Available: http://openflow.org
-
"OpenFlow project," http://openflow.org/. [Online]. Available: http://openflow.org/
-
OpenFlow Project
-
-
-
23
-
-
84893582495
-
-
Online. Available: http://openvswitch.org
-
"Open vSwitch project," http://openvswitch.org/. [Online]. Available: http://openvswitch.org/
-
Open VSwitch Project
-
-
-
27
-
-
33747198726
-
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
-
Sep.
-
L. Wang, A. Liu, and S. Jajodia, "Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts," Computer Communications, vol. 29, no. 15, pp. 2917-2933, Sep. 2006.
-
(2006)
Computer Communications
, vol.29
, Issue.15
, pp. 2917-2933
-
-
Wang, L.1
Liu, A.2
Jajodia, S.3
-
28
-
-
79958184435
-
A new alert correlation algorithm based on attack graph
-
Computational Intelligence in Security for Information Systems, ser. Springer
-
S. Roschke, F. Cheng, and C. Meinel, "A new alert correlation algorithm based on attack graph," in Computational Intelligence in Security for Information Systems, ser. Lecture Notes in Computer Science. Springer, 2011, vol. 6694, pp. 58-67.
-
(2011)
Lecture Notes in Computer Science
, vol.6694
, pp. 58-67
-
-
Roschke, S.1
Cheng, F.2
Meinel, C.3
-
29
-
-
78650313678
-
A flexible and efficient alert correlation platform for distributed IDS
-
IEEE, Sep.
-
S. Roschke, F. Cheng, and C. Meinel, "A flexible and efficient alert correlation platform for distributed IDS," in 2010 4th International Conference on Network and System Security (NSS). IEEE, Sep. 2010, pp. 24-31.
-
(2010)
2010 4th International Conference on Network and System Security (NSS)
, pp. 24-31
-
-
Roschke, S.1
Cheng, F.2
Meinel, C.3
-
30
-
-
68649129121
-
OpenFlow: Enabling innovation in campus networks
-
Mar.
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, "OpenFlow: enabling innovation in campus networks," SIGCOMM Comput. Commun. Rev., vol. 38, no. 2, pp. 69-74, Mar. 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
31
-
-
84893601666
-
-
Available
-
"Volatility." [Online]. Available: https://code.google.com/ volatility/
-
"Volatility." [Online]
-
-
|