Sciweavers

1090 search results - page 15 / 218
» A Replicated Monitoring Tool
Sort
View
SICHERHEIT
2010
14 years 7 months ago
A Malware Instruction Set for Behavior-Based Analysis
We introduce a new representation for monitored behavior of malicious software called Malware Instruction Set (MIST). The representation is optimized for effective and efficient a...
Philipp Trinius, Carsten Willems, Thorsten Holz, K...
63
Voted
CHI
2007
ACM
15 years 1 months ago
An exploration of web-based monitoring: implications for design
Monitoring occurs when users return to previously viewed web pages to view new or updated information. While tools exist to support web-based monitoring, we know little about the ...
Melanie Kellar, Carolyn R. Watters, Kori M. Inkpen
75
Voted
IADIS
2003
14 years 11 months ago
Application of Metadata and Replication Mechanisms in Industrial Databases
Power transformers' failures carry great costs to electric companies since they need resources to recover from them and to perform periodical maintenance. To avoid this probl...
Perfecto Mariño, César A. Sigüe...
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
15 years 4 months ago
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today’s computers. Malware is often designed to immediately disable ...
Bryan D. Payne, Martim Carbone, Monirul I. Sharif,...
109
Voted
ICDCS
1999
IEEE
15 years 2 months ago
HiFi: A New Monitoring Architecture for Distributed Systems Management
With the increasing complexity of large-scale distributed (LSD) systems, an efficient monitoring mechanism has become an essential service for improving the performance and reliab...
Ehab S. Al-Shaer, Hussein M. Abdel-Wahab, Kurt Mal...