-
2
-
-
84966325113
-
-
Argus. http://argus. Tcp4me. com/.
-
-
-
-
3
-
-
84966325112
-
-
Cacti. http://www. cacti. net/.
-
-
-
-
4
-
-
84966319754
-
-
Collectd. http://collectd. org/.
-
-
-
-
5
-
-
84966319762
-
-
CVEs for Linux Kernel 2. 6. 32. http://cvedetails. com/version-search. php? vendor=linux&product=&version=2. 6. 32.
-
CVEs for Linux Kernel 2. 6. 32
-
-
-
6
-
-
84966300486
-
-
Ganglia. http://ganglia. info/.
-
-
-
-
7
-
-
84966452337
-
-
Grsecurity. https://grsecurity. net/.
-
-
-
-
8
-
-
84966300497
-
-
Monit. http://mmonit. com/monit/.
-
-
-
-
9
-
-
84966291520
-
-
Munin. http://munin-monitoring. org/.
-
-
-
-
10
-
-
84966298784
-
-
Nagios. http://www. nagios. org/.
-
-
-
-
11
-
-
84966378899
-
-
Observium. http://www. observium. org.
-
-
-
-
14
-
-
84966404712
-
-
SUNY Buffalo HPC. http://casc. org/meetings/10sep/Furlani. ppt.
-
SUNY Buffalo HPC
-
-
-
16
-
-
84966298805
-
-
Zabbix. http://www. zabbix. com/.
-
-
-
-
17
-
-
84966298822
-
-
Zenoss. http://www. zenoss. com/.
-
-
-
-
20
-
-
85084163093
-
Through the looking-glass, and what Eve found there
-
USENIX Association
-
L. Bruno, M. Graziano, D. Balzarotti, and A. Francillon. Through the looking-glass, and what eve found there. In USENIX Workshop on Offensive Technologies (WOOT). USENIX Association, 2014.
-
(2014)
USENIX Workshop on Offensive Technologies (WOOT)
-
-
Bruno, L.1
Graziano, M.2
Balzarotti, D.3
Francillon, A.4
-
21
-
-
51449085610
-
Vulnerability type distributions in CVE
-
S. Christey and R. A. Martin. Vulnerability type distributions in CVE. Mitre Report, 2007.
-
(2007)
Mitre Report
-
-
Christey, S.1
Martin, R.A.2
-
24
-
-
85077703150
-
Polymorphic blending attacks
-
P. Fogla, M. I. Sharif, R. Perdisci, O. M. Kolesnikov, and W. Lee. Polymorphic Blending Attacks. In USENIX Security Symposium, 2006.
-
(2006)
USENIX Security Symposium
-
-
Fogla, P.1
Sharif, M.I.2
Perdisci, R.3
Kolesnikov, O.M.4
Lee, W.5
-
26
-
-
84966352112
-
The application of cacti in the campus network traffic monitoring [j]
-
L. Y. L. J. Z. Haiyan. The application of cacti in the campus network traffic monitoring [j]. Computer & Telecommunication, 2008.
-
(2008)
Computer & Telecommunication
-
-
Haiyan, L.Y.L.J.Z.1
-
34
-
-
85077528077
-
Automating mimicry attacks using static binary analysis
-
USENIX Association
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Automating mimicry attacks using static binary analysis. In USENIX Security Symposium. USENIX Association, 2005.
-
(2005)
USENIX Security Symposium
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
35
-
-
84966452367
-
Application of open source systems in the seismic monitoring network [j]
-
G. LI, L.-x. ZHOU, X.-l. WANG, S.-c. QI, H.-q. YAO, and J.-y. SUN. Application of open source systems in the seismic monitoring network [j]. Northwestern Seismological Journal, 2011.
-
(2011)
Northwestern Seismological Journal
-
-
Li, G.1
Zhou, L.-X.2
Wang, X.-L.3
Qi, S.-C.4
Yao, H.-Q.5
Sun, J.-Y.6
-
36
-
-
3342966061
-
The ganglia distributed monitoring system: Design, implementation, and experience
-
M. L. Massie, B. N. Chun, and D. E. Culler. The ganglia distributed monitoring system: design, implementation, and experience. Parallel Computing, 2004.
-
(2004)
Parallel Computing
-
-
Massie, M.L.1
Chun, B.N.2
Culler, D.E.3
-
41
-
-
33845477024
-
Clusters and security: Distributed security for distributed systems
-
M. Pourzandi, D. Gordon, W. Yurcik, and G. A. Koenig. Clusters and security: distributed security for distributed systems. In Cluster Computing and the Grid, 2005. CCGrid 2005. IEEE International Symposium on. IEEE, 2005.
-
(2005)
Cluster Computing and the Grid, 2005. CCGrid 2005. IEEE International Symposium On. IEEE
-
-
Pourzandi, M.1
Gordon, D.2
Yurcik, W.3
Koenig, G.A.4
-
42
-
-
84966294814
-
-
U. B. M. Project. Millennium project web
-
U. B. M. Project. Millennium project web page. http://www. millennium. Berkeley. edu, 1999.
-
(1999)
-
-
-
43
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In ACM Conference on Computer and Communications Security (CCS). ACM, 2009.
-
(2009)
ACM Conference on Computer and Communications Security (CCS). ACM
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
47
-
-
80955143542
-
All your clouds are belong to us: Security analysis of cloud management interfaces
-
J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono. All Your Clouds Are Belong to Us: Security Analysis of Cloud Management Interfaces. In Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, 2011.
-
(2011)
Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop
-
-
Somorovsky, J.1
Heiderich, M.2
Jensen, M.3
Schwenk, J.4
Gruschka, N.5
Lo Iacono, L.6
-
50
-
-
84887309913
-
Cross site scripting prevention with dynamic data tainting and static analysis
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In ISOC Network and Distributed System Security Symposium (NDSS), 2007.
-
(2007)
ISOC Network and Distributed System Security Symposium (NDSS)
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
|