Papers

Search results

    ConferenceTitleAuthor(s)
    LISA '11Getting to Elastic: Adapting a Legacy Vertical Application Environment for ScalabilityEric Shamow
    LISA '11Scaling on EC2 in a Fast-Paced Environment (Practice & Experience Report)Nicolas Brousse
    LISA '11DarkNOC: Dashboard for Honeypot ManagementBertrand Sobesto, Michel Cukier, Matti Hiltunen, Dave Kormann, Gregg Vesonder, Robin Berthier
    LISA '11A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large NetworksDamiano Bolzoni, Christiaan Schade, Sandro Etalle
    LISA '11Auto-learning of SMTP TCP Transport-Layer Features for Spam and Abusive Message DetectionGeorgios Kakavelakis, Joel Young
    LISA '11Using Active Intrusion Detection to Recover Network TrustJohn F. Williamson, Sergey Bratus, Michael E. Locasto
    LISA '11Community-based Analysis of Netflow for Early Detection of Security IncidentsStefan Weigert, Matti A. Hiltunen, Christof Fetzer
    LISA '11WCIS: A Prototype for Detecting Zero-Day Attacks in Web Server RequestsMelissa Danforth
    LISA '11Automating Network and Service Configuration Using NETCONF and YANGStefan Wallin, Claes Wikström
    LISA '11Adventures in (Small) Datacenter Migration (Practice & Experience Report)Jon Kuroda, Jeff Anderson-Lee, Albert Goto, Scott McNally
    LISA '11Experiences with BOWL: Managing an Outdoor WiFi Network (or How to Keep Both Internet Users and Researchers Happy?) (Practice & Experience Report)T. Fischer, T. Hühn, R. Kuck, R. Merz, J. Schulz-Zander, C. Sengul
    LISA '11Why Do Migrations Fail and What Can We Do about It?Gong Zhang, Ling Liu
    LISA '11Provenance for System TroubleshootingMarc Chiarini
    LISA '11Debugging Makefiles with remakeRocky Bernstein
    LISA '10A Survey of System Configuration ToolsThomas Delaet, Wouter Joosen, Bart Vanbrabant
    LISA '10High Performance Multi-Node File Copies and Checksums for Clustered File SystemsPaul Z. Kolano, Robert B. Ciotti
    LISA '10Fast and Secure Laptop Backups with Encrypted De-duplicationPaul Anderson, Le Zhang
    LISA '10The Margrave Tool for Firewall AnalysisTimothy Nelson, Christopher Barratt, Daniel J. Dougherty, Kathi Fisler, Shriram Krishnamurthi
    LISA '10Towards Automatic Update of Access Control PolicyJinwei Hu, Yan Zhang, Ruixuan Li
    LISA '10First Step Towards Automatic Correction of Firewall Policy FaultsFei Chen, Alex X. Liu, JeeHyun Hwang, Tao Xie
    LISA '10When Anti-virus Doesn't Cut It: Catching Malware with SIEMWyman Stocks
    LISA '10In-Flight Mechanics: A Software Package Management Conversion ProjectPhilip J. Hollenback
    LISA '10Experiences with Eucalyptus: Deploying an Open Source CloudRick Bradshaw, Piotr T Zbiegiel
    LISA '10Using TCP/IP Traffic Shaping to Achieve iSCSI Service Predictability J. Bjørgeengen, H. Haugerud
    LISA '10YAF: Yet Another FlowmeterChristopher M. Inacio, Brian Trammell

Pages