Coordinating Fast Concurrency Adapting With Autoscaling for SLO-Oriented Web Applications | 0 | 0.34 | 2022 |
IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms | 0 | 0.34 | 2022 |
SODA - A System for Cyber Deception Orchestration and Automation. | 0 | 0.34 | 2021 |
CHIMERA: Autonomous Planning and Orchestration for Malware Deception | 0 | 0.34 | 2021 |
DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid Analysis of Malware | 0 | 0.34 | 2020 |
Mitigating Large Response Time Fluctuations through Fast Concurrency Adapting in Clouds | 0 | 0.34 | 2020 |
Binary-centric defense of production operating systems against kernel queue injection attacks | 0 | 0.34 | 2019 |
A Reflective Covert Channel Attack Anchored On Trusted Web Services | 0 | 0.34 | 2018 |
City Disaster Susceptibility Comparisons using Weighted Bipartite Graphs. | 0 | 0.34 | 2018 |
Integritymr: Exploring Result Integrity Assurance Solutions For Big Data Computing Applications | 0 | 0.34 | 2016 |
Toward integrity assurance of outsourced computing — a game theoretic perspective | 2 | 0.37 | 2016 |
Toward protecting control flow confidentiality in cloud-based computation | 5 | 0.53 | 2015 |
MOSE: Live Migration Based On-the-Fly Software Emulation. | 2 | 0.37 | 2015 |
An adaptive middleware design to support the dynamic interpretation of domain-specific models | 2 | 0.36 | 2015 |
Static analysis based invariant detection for commodity operating systems. | 3 | 0.37 | 2014 |
A bipartite-graph based approach for disaster susceptibility comparisons among cities | 0 | 0.34 | 2014 |
Result Integrity Check for MapReduce Computation on Hybrid Clouds | 8 | 0.48 | 2013 |
Constructing E-Tourism platform based on service value broker: A knowledge management perspective | 0 | 0.34 | 2013 |
IntegrityMR: Integrity assurance framework for big data analytics and management applications | 4 | 0.40 | 2013 |
Value-Added Modelling and Analysis in Service Value Brokerage. | 1 | 0.39 | 2013 |
KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks. | 0 | 0.34 | 2013 |
Toward a general defense against kernel queue hooking attacks | 1 | 0.36 | 2012 |
Towards Adaptable Middleware to Support Service Delivery Validation in i-DSML Execution Engines | 4 | 0.40 | 2012 |
Software persistent memory | 13 | 0.64 | 2012 |
Flying under the radar: maintaining control of kernel without changing kernel code or persistent data structures | 0 | 0.34 | 2011 |
Static analysis based invariant detection for commodity operating systems. | 0 | 0.34 | 2011 |
VIAF: Verification-Based Integrity Assurance Framework for MapReduce | 23 | 0.90 | 2011 |
Fixed-Parameter Tractable Combinatorial Algorithms for Metabolic Networks Alignments | 0 | 0.34 | 2010 |
WS-GraphMatching: a web service tool for graph matching | 0 | 0.34 | 2010 |
Modeling and preventing TOCTTOU vulnerabilities in Unix-style file systems | 1 | 0.35 | 2010 |
Modeling the Runtime Integrity of Cloud Servers: A Scoped Invariant Perspective | 5 | 0.45 | 2010 |
Managing security of virtual machine images in a cloud environment | 87 | 4.53 | 2009 |
A Secure Information Flow Architecture for Web Service Platforms | 9 | 0.65 | 2008 |
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense | 17 | 0.81 | 2008 |
A Secure Information Flow Architecture for Web Services | 3 | 0.42 | 2008 |
Towards scalable and high performance I/O virtualization: a case study | 3 | 0.42 | 2007 |
Multiprocessors May Reduce System Dependability under File-Based Race Condition Attacks | 5 | 0.46 | 2007 |
TOCTTOU vulnerabilities in UNIX-style file systems: an anatomical study | 23 | 0.81 | 2005 |