메뉴 건너뛰기




Volumn , Issue , 2013, Pages 275-282

A fine-grained fault detection technique based on the virtual machine monitor

Author keywords

Availability; Fault detection; System call monitoring; Virtualization

Indexed keywords

AVAILABILITY; BIG DATA; CLOUD COMPUTING; EXPERIMENTS; INTRUSION DETECTION; VIRTUAL REALITY;

EID: 84904570940     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CLOUDCOM-ASIA.2013.18     Document Type: Conference Paper
Times cited : (2)

References (22)
  • 2
    • 26844568000 scopus 로고    scopus 로고
    • Detecting application-level failures in component-based internet services
    • Sept.
    • Emre Kcman and Armando Fox. "Detecting Application-level Failures in Component-based Internet Services," IEEE Transactions on Neural Networks, Volume:16,Issue:5, pp:1027-1041, Sept. 2005.
    • (2005) IEEE Transactions on Neural Networks , vol.16 , Issue.5 , pp. 1027-1041
    • Kcman, E.1    Fox, A.2
  • 3
    • 20344389520 scopus 로고    scopus 로고
    • The architecture of virtual machines
    • James E. Smith, Ravi Nair. "The Architecture of Virtual Machines," IEEE Computer Society. V38(5), pp:32-38, 2005.
    • (2005) IEEE Computer Society , vol.38 , Issue.5 , pp. 32-38
    • Smith, J.E.1    Nair, R.2
  • 5
    • 4444365711 scopus 로고    scopus 로고
    • Measurements and analysis of ser-tolerant latch in a 90 nm dual-vt cmos process
    • Hazucha P, Karnik T, Walstra S, et al. "Measurements and Analysis of SER-tolerant Latch in a 90 nm dual-VT CMOS Process," Solid-State Circuits, IEEE Journal of, 2004, 39(9): 1536-1543.
    • (2004) Solid-State Circuits, IEEE Journal of , vol.39 , Issue.9 , pp. 1536-1543
    • Hazucha, P.1    Karnik, T.2    Walstra, S.3
  • 6
    • 0142184763 scopus 로고    scopus 로고
    • Cost-effective approach for reducing soft error failure rate in logic circuits
    • Mohanram K, Touba N A. "Cost-effective Approach for Reducing Soft Error Failure Rate in Logic Circuits," International Test Conference, 2003, pp: 893-901.
    • (2003) International Test Conference , pp. 893-901
    • Mohanram, K.1    Touba, N.A.2
  • 10
    • 85080362568 scopus 로고    scopus 로고
    • A virtual machine introspection based architecture for intrusion detection
    • Garfinkel T, Rosenblum M. "A Virtual Machine Introspection Based Architecture for Intrusion Detection," NDSS. 2003.
    • (2003) NDSS
    • Garfinkel, T.1    Rosenblum, M.2
  • 13
    • 70350451637 scopus 로고    scopus 로고
    • A Grid based diagnostics and prognosis system for rolls royce aero engines: The dame project
    • Austin J. "A Grid Based Diagnostics and Prognosis System for Rolls Royce Aero Engines: The DAME Project," CLADE. 2004.
    • (2004) CLADE
    • Austin, J.1
  • 14
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system call
    • January 01
    • Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji. "Intrusion Detection Using Sequences of System Call," In: Journal of Computer Security, Issue: Volume 6, Number 3/1998,pp:151-180,January 01, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.A.1    Forrest, S.2    Somayaji, A.3
  • 17
    • 84952503562 scopus 로고
    • Thirteen ways to look at the correlation coefficient
    • J. Rodgers and W. Nicewander. "Thirteen Ways to Look at the Correlation Coefficient," The American Statistician, vol. 42, no. 1, pp. 59-66,1988.
    • (1988) The American Statistician , vol.42 , Issue.1 , pp. 59-66
    • Rodgers, J.1    Nicewander, W.2
  • 20
    • 0031123369 scopus 로고    scopus 로고
    • Fault injection techniques and tools
    • M.-C. Hsueh,T. K. Tsai, and R. K. Iyer. "Fault Injection Techniques and Tools," Computer, vol. 30,no. 4, pp. 75-82,1997.
    • (1997) Computer , vol.30 , Issue.4 , pp. 75-82
    • Hsueh, M.-C.1    Tsai, T.K.2    Iyer, R.K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.