-
1
-
-
28244452368
-
Causality-Based Predicate Detection across Space and Time
-
Punit Chandra and Ajay D. Kshemkalyani. Causality-Based Predicate Detection across Space and Time. IEEE Transactions on Computers, 54(11):1438-1453, 2005.
-
(2005)
IEEE Transactions on Computers
, vol.54
, Issue.11
, pp. 1438-1453
-
-
Chandra, Punit1
Kshemkalyani, Ajay D.2
-
2
-
-
77952121542
-
The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond
-
Aaron Emigh. The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond. Journal of Digital Forensic Practice, 1:245 - 260, 2006.
-
(2006)
Journal of Digital Forensic Practice
, vol.1
, pp. 245-260
-
-
Emigh, Aaron1
-
4
-
-
0037886682
-
-
John Wiley and Sons Inc
-
Vijay K. Garg. Elements of Distributed Computing, chapter 1, 2, 3, 4, 10, 11, 12, 20. John Wiley and Sons Inc, 2002.
-
(2002)
Elements of Distributed Computing, chapter 1, 2, 3, 4, 10, 11, 12, 20
-
-
Garg, Vijay K.1
-
5
-
-
39049162016
-
PAST: Probabilistic Authentication of Sensor Timestamps
-
Washington, DC, USA, IEEE Computer Society
-
Ashish Gehani and Surendar Chandra. PAST: Probabilistic Authentication of Sensor Timestamps. In ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference, pages 439-448, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference
, pp. 439-448
-
-
Gehani, Ashish1
Chandra, Surendar2
-
7
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
1998
-
Steven A. Hofmeyr, Stephanie Forrest, and Anil Somayaji. Intrusion detection using sequences of system calls. Journal of Computer Security, 1998, 6(3):151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, Steven A.1
Forrest, Stephanie2
Somayaji, Anil3
-
9
-
-
84969513597
-
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
-
page 1, Washington, DC, USA, IEEE Computer Society
-
Oleg Kachirski and Ratan Guha. Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks. In HICSS '03: Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 2, page 57.1, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
HICSS '03: Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 2
, pp. 57
-
-
Kachirski, Oleg1
Guha, Ratan2
-
12
-
-
0030125764
-
Temporal interactions of intervals in distributed systems
-
Ajay D. Kshemkalyani. Temporal interactions of intervals in distributed systems. Journal of Computer and System Sciences, 52(2):287-298, 1996.
-
(1996)
Journal of Computer and System Sciences
, vol.52
, Issue.2
, pp. 287-298
-
-
Kshemkalyani, Ajay D.1
-
17
-
-
33750931965
-
Run-Time Detection of Covert Channels
-
Washington, DC, USA, IEEE Computer Society
-
Naoyuki Nagatou and Takuo Watanabe. Run-Time Detection of Covert Channels. In ARES '06: Proceedings of the First International Conference on Availability, Reliability and Security, pages 577-584, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
ARES '06: Proceedings of the First International Conference on Availability, Reliability and Security
, pp. 577-584
-
-
Nagatou, Naoyuki1
Watanabe, Takuo2
-
21
-
-
32544444487
-
-
Technical Report ECE-PDS-1998-006, Parallel and Distributed Systems Laboratory, ECE Dept. University of Texas at Austin
-
Ashis Tarafdar and Vijay K. Garg. Happened Before is the Wrong Model for Potential Causality. Technical Report ECE-PDS-1998-006, Parallel and Distributed Systems Laboratory, ECE Dept. University of Texas at Austin, 1998.
-
(1998)
Happened Before is the Wrong Model for Potential Causality
-
-
Tarafdar, Ashis1
Garg, Vijay K.2
-
22
-
-
0029253406
-
Testing and Debugging Distributed Programs Using Global Predicates
-
S. Venkatesan and Brahma Dathan. Testing and Debugging Distributed Programs Using Global Predicates. IEEE Transactions on Software Engineering, 21(2):163-177, 1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.2
, pp. 163-177
-
-
Venkatesan, S.1
Dathan, Brahma2
|