Sciweavers

55 search results - page 4 / 11
» dsn 2005
Sort
View
DSN
2005
IEEE
13 years 11 months ago
Towards a Theory of Insider Threat Assessment
Insider attacks are a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who abuse their privileges, and given their famil...
Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Sham...
DSN
2005
IEEE
13 years 11 months ago
Model-Based Failure Analysis of Journaling File Systems
We propose a novel method to measure the dependability of journaling file systems. In our approach, we build models of how journaling file systems must behave under different jo...
Vijayan Prabhakaran, Andrea C. Arpaci-Dusseau, Rem...
DSN
2005
IEEE
13 years 11 months ago
Fatih: Detecting and Isolating Malicious Routers
Network routers occupy a key role in modern data transport and consequently are attractive targets for attackers. By manipulating, diverting or dropping packets arriving at a comp...
Alper Tugay Mizrak, Yu-Chung Cheng, Keith Marzullo...
DSN
2005
IEEE
13 years 11 months ago
A Performability-Oriented Software Rejuvenation Framework for Distributed Applications
While inherent resource redundancies in distributed applications facilitate gracefully degradable services, methods to enhance their dependability may have subtle, yet significan...
Ann T. Tai, Kam S. Tso, William H. Sanders, Savio ...
DSN
2005
IEEE
13 years 8 months ago
A Spatial Fluid-Based Framework to Analyze Large-Scale Wireless Sensor Networks
The behavior of large-scale wireless sensor networks has been shown to be surprisingly complex and difficult to analyze, both by empirical experiment and simulation. In this pape...
Marco Gribaudo, Carla-Fabiana Chiasserini, Rossano...