Papers

Search results

    ConferenceTitleAuthor(s)
    LISA '02Geographically Distributed System for Catastrophic RecoveryKevin Adams
    LISA '02Embracing and Extending Windows 2000Jon Finke
    LISA '02Stem: The System Administration EnablerUri Guttman
    LISA '02Pan: A High-Level Configuration LanguageLionel Cons, Piotr Poznanski
    LISA '02Why Order Matters: Turing Equivalence in Automated Systems AdministrationSteve Traugott, Lance Brown
    LISA '02A New Architecture for Managing Enterprise Log DataAdam Sah
    LISA '02MieLog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical AnalysisTetsuji Takada, Hideki Koike
    LISA '02Process Monitor: Detecting Events That Didn't Happen
    LISA '02An Analysis of RPM Validation DriftJohn Hart, Jeffrey D'Amelia
    LISA '02RTG: A Scalable SNMP Statistics Architecture for Service ProvidersRobert Beverly
    LISA '02Environmental Acquisition in Network ManagementMark Logan, Matthias Felleisen, David Blank-Edelman
    LISA '02A Simple Way to Estimate the Cost of DowntimeDavid A. Patterson
    LISA '02Defining and Monitoring Service-Level Agreements for Dynamic e-BusinessAlexander Keller, Heiko Ludwig
    LISA '02HotSwap–Transparent Server Failover for LinuxNoel Burton-Krahn
    LISA '02Over-Zealous Security Administrators Are Breaking the InternetRichard van den Berg, Phil Dibowitz
    LISA '02An Approach for Secure Software InstallationV.N. Venkatakrishnan, R. Sekar, T. Kamat, S. Tsipa, Z. Liang
    LISA '02Network-based Intrusion Detection–Modeling for a Larger PictureAtsushi Totsuka, Hidenari Ohwada, Nobuhisa Fujita, Debasish Chakraborty, Glenn Mansfield Keeni, Norio Shiratori
    LISA '02Timing the Application of Security Patches for Optimal UptimeSteve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, Chris Wright, Adam Shostack
    USENIX Security '02Security in Plan 9Russ Cox, Eric Grosse, Rob Pike, Dave Presotto, Sean Quinlan
    USENIX Security '02Linux Security Modules: General Security Support for the Linux KernelChris Wright, Crispin Cowan, Stephen Smalley, James Morris, Greg Kroah-Hartman
    USENIX Security '02Using CQUAL for Static Analysis of Authorization Hook PlacementXiaolan Zhang, Antony Edwards, Trent Jaeger
    USENIX Security '02Using Text Categorization Techniques for Intrusion DetectionYihua Liao, V. Rao Vemuri
    USENIX Security '02Detecting Manipulated Remote Call StreamsJonathon T. Giffin, Somesh Jha, Barton P. Miller
    USENIX Security '02Type-Assisted Dynamic Buffer Overflow DetectionKyung-suk Lhee, Steve J. Chapin
    USENIX Security '02A General and Flexible Access-Control System for the WebLujo Bauer, Michael A. Schneider, Edward W. Felten

Pages