Sciweavers

2335 search results - page 363 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
125
Voted
CONEXT
2006
ACM
15 years 7 months ago
Synergy: blending heterogeneous measurement elements for effective network monitoring
Network traffic matrices are important for various network planning and management operations. Previous work for estimation of traffic matrices is based on either link load record...
Awais Ahmed Awan, Andrew W. Moore
LCTRTS
2001
Springer
15 years 6 months ago
Middleware For Building Adaptive Systems Via Configuration
1 COTS (commercial off-the-shelf) devices are capable of executing powerful, distributed algorithms. Very large, adaptive systems can be created by simply integrating these devices...
Sanjai Narain, Ravichander Vaidyanathan, Stanley M...
ICSE
2005
IEEE-ACM
16 years 1 months ago
Use of relative code churn measures to predict system defect density
Software systems evolve over time due to changes in requirements, optimization of code, fixes for security and reliability bugs etc. Code churn, which measures the changes made to...
Nachiappan Nagappan, Thomas Ball
ICC
2008
IEEE
118views Communications» more  ICC 2008»
15 years 8 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao
PLDI
2009
ACM
15 years 8 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni