Sciweavers

9503 search results - page 19 / 1901
» Authenticated System Calls
Sort
View
NDSS
2003
IEEE
15 years 5 months ago
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools
System call interposition is a powerful method for regulating and monitoring application behavior. In recent years, a wide variety of security tools have been developed that use t...
Tal Garfinkel
NDSS
2000
IEEE
15 years 3 months ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
WISA
2007
Springer
15 years 5 months ago
Detecting Motifs in System Call Sequences
The search for patterns or motifs in data represents an area of key interest to many researchers. In this paper we present the Motif Tracking Algorithm, a novel immune inspired pat...
William O. Wilson, Jan Feyereisl, Uwe Aickelin
IWCMC
2006
ACM
15 years 5 months ago
Neural fuzzy call admission and rate controller for WCDMA cellular systems providing multirate services
The paper proposes a neural fuzzy call admission and rate controller (NFARC) scheme for WCDMA cellular systems providing multirate services. The NFARC scheme can guarantee the qua...
Chung-Ju Chang, Li-Chung Kuo, Yih-Shen Chen, Scott...
CLUSTER
2007
IEEE
15 years 6 months ago
FlexRPC: A flexible Remote Procedure Call facility for modern cluster file systems
— The concept of Remote Procedure Call (RPC) was proposed more than 30 years ago. Although various RPC systems have been studied and implemented, the existing RPC systems lack ma...
Sang-Hoon Kim, Youngjae Lee, Jin-Soo Kim