Sciweavers

58 search results - page 12 / 12
» Detecting Insider Threats by Monitoring System Call Activity
Sort
View
CCGRID
2004
IEEE
13 years 9 months ago
Protection mechanisms for application service hosting platforms
The Application Service Hosting Platform (ASHP) has recently received tremendous attention from both industry and academia. An ASHP provides a shared highperformance infrastructur...
Xuxian Jiang, Dongyan Xu, Rudolf Eigenmann
ACL
2010
13 years 4 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder
WWW
2006
ACM
14 years 6 months ago
Selective early request termination for busy internet services
Internet traffic is bursty and network servers are often overloaded with surprising events or abnormal client request patterns. This paper studies a load shedding mechanism called...
Jingyu Zhou, Tao Yang