Sciweavers

69 search results - page 12 / 14
» Approaching Real-Time Intrusion Detection through MOVICAB-ID...
Sort
View
COMSNETS
2012
199views more  COMSNETS 2012»
12 years 17 days ago
Varanus: More-with-less fault localization in data centers
Abstract—Detecting and localizing performance faults is crucial for operating large enterprise data centers. This problem is relatively straightforward to solve if each entity (a...
Vaishali P. Sadaphal, Maitreya Natu, Harrick M. Vi...
VC
2008
93views more  VC 2008»
13 years 4 months ago
Contact identification for assembly-disassembly simulation with a haptic device
: Assembly/disassembly (A/D) simulations using haptic devices are facing difficulties while simulating insertion/extraction such as cylinders from holes. In order to address this c...
Robert Iacob, Peter Mitrouchev, Jean-Claude L&eacu...
IEEEPACT
2007
IEEE
13 years 11 months ago
JudoSTM: A Dynamic Binary-Rewriting Approach to Software Transactional Memory
With the advent of chip-multiprocessors, we are faced with the challenge of parallelizing performance-critical software. Transactional memory (TM) has emerged as a promising progr...
Marek Olszewski, Jeremy Cutler, J. Gregory Steffan
RAID
2010
Springer
13 years 3 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
ACSAC
2009
IEEE
13 years 11 months ago
FPValidator: Validating Type Equivalence of Function Pointers on the Fly
—Validating function pointers dynamically is very useful for intrusion detection since many runtime attacks exploit function pointer vulnerabilities. Most current solutions tackl...
Hua Wang, Yao Guo, Xiangqun Chen