Sciweavers

8177 search results - page 225 / 1636
» Detecting System Emulators
Sort
View
169
Voted
DATE
2003
IEEE
176views Hardware» more  DATE 2003»
15 years 6 months ago
Hardware/Software Partitioning of Operating Systems
As MultiProcessor System-on-a-Chip (MPSoC) designs become more common, hardware/software codesign engineers face new challenges involving operating system integration. To speed up...
Vincent John Mooney
IWIA
2005
IEEE
15 years 6 months ago
Forensic Analysis of File System Intrusions Using Improved Backtracking
Intrusion detection systems alert the system administrators of intrusions but, in most cases, do not provide details about which system events are relevant to the intrusion and ho...
Sriranjani Sitaraman, Subbarayan Venkatesan
ASPLOS
2011
ACM
14 years 4 months ago
Ensuring operating system kernel integrity with OSck
Kernel rootkits that modify operating system state to avoid detection are a dangerous threat to system security. This paper presents OSck, a system that discovers kernel rootkits ...
Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indraj...
98
Voted
ENGL
2007
100views more  ENGL 2007»
15 years 22 days ago
Skew Estimation Technique for Binary Document Images based on Thinning and Moments
-When a document is fed to a scanner either mechanically or by a human operator for digitization, it suffers from some degrees of skew or tilt. Skew angle detection is an important...
Aradhya V. N. Manjunath, G. Hemantha Kumar, P. Shi...
91
Voted
IWDC
2004
Springer
156views Communications» more  IWDC 2004»
15 years 6 months ago
Agent-Based Distributed Intrusion Alert System
Intrusion detection for computer systems is a key problem in today’s networked society. Current distributed intrusion detection systems (IDSs) are not fully distributed as most o...
Arjita Ghosh, Sandip Sen