Sciweavers

186 search results - page 12 / 38
» Operational Characteristics of an Automated Intrusion Respon...
Sort
View
80
Voted
CCS
2007
ACM
15 years 3 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
LISA
2007
14 years 12 months ago
PDA: A Tool for Automated Problem Determination
Problem determination remains one of the most expensive and time-consuming functions in system management due to the difficulty in automating what is essentially a highly experien...
Hai Huang, Raymond B. Jennings III, Yaoping Ruan, ...
96
Voted
DSOM
2000
Springer
15 years 1 months ago
Operational Data Analysis: Improved Predictions Using Multi-computer Pattern Detection
Operational Data Analysis (ODA) automatically 1) monitors the performance of a computer through time, 2) stores such information in a data repository, 3) applies data-mining techn...
Ricardo Vilalta, Chidanand Apté, Sholom M. ...
CDES
2006
62views Hardware» more  CDES 2006»
14 years 11 months ago
On the Management of Object Interrelationships
Still one of the main problems in computing security is the scope malicious intruders can gain by introducing their own thread of control. To make this worse, coarse grained struc...
Martin Uhl, Werner Held
OSDI
2004
ACM
15 years 9 months ago
Automated Worm Fingerprinting
Network worms are a clear and growing threat to the security of today's Internet-connected hosts and networks. The combination of the Internet's unrestricted connectivit...
Sumeet Singh, Cristian Estan, George Varghese, Ste...