Sciweavers

51 search results - page 1 / 11
» Isolating Intrusions by Automatic Experiments
Sort
View
NDSS
2006
IEEE
13 years 11 months ago
Isolating Intrusions by Automatic Experiments
When dealing with malware infections, one of the first tasks is to find the processes that were involved in the attack. We introduce Malfor, a system that isolates those process...
Stephan Neuhaus, Andreas Zeller
SE
2007
13 years 6 months ago
Isolating cause-effect chains in computer systems
: One of the major tasks in maintaining software systems is understanding how specific effects came to be. This is especially true for effects that cause major harm, and especiall...
Stephan Neuhaus, Andreas Zeller
ICDCS
2003
IEEE
13 years 10 months ago
Integrated Access Control and Intrusion Detection for Web Servers
Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between thes...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, L...
MICCAI
2010
Springer
13 years 3 months ago
Fast and Automatic Heart Isolation in 3D CT Volumes: Optimal Shape Initialization
Abstract. Heart isolation (separating the heart from the proximity tissues, e.g., lung, liver, and rib cage) is a prerequisite to clearly visualize the coronary arteries in 3D. Suc...
Yefeng Zheng, Fernando Vega Higuera, Shaohua Kevin...
DATE
2006
IEEE
113views Hardware» more  DATE 2006»
13 years 11 months ago
Automatic ADL-based operand isolation for embedded processors
Cutting-edge applications of future embedded systems demand highest processor performance with low power consumption to get acceptable battery-life times. Therefore, low power opt...
Anupam Chattopadhyay, B. Geukes, David Kammler, Er...