Vigilante
- 20 October 2005
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGOPS Operating Systems Review
- Vol. 39 (5), 133-147
- https://doi.org/10.1145/1095809.1095824
Abstract
No abstract availableKeywords
This publication has 19 references indexed in Scilit:
- Detecting past and present intrusions through vulnerability-specific predicatesPublished by Association for Computing Machinery (ACM) ,2005
- Secure program execution via dynamic information flow trackingPublished by Association for Computing Machinery (ACM) ,2004
- ShieldPublished by Association for Computing Machinery (ACM) ,2004
- Countering code-injection attacks with instruction-set randomizationPublished by Association for Computing Machinery (ACM) ,2003
- Inside the Slammer wormIEEE Security & Privacy, 2003
- A survey of rollback-recovery protocols in message-passing systemsACM Computing Surveys, 2002
- Secure routing for structured peer-to-peer overlay networksPublished by Association for Computing Machinery (ACM) ,2002
- The Mathematics of Infectious DiseasesSIAM Review, 2000
- Bro: a system for detecting network intruders in real-timeComputer Networks, 1999
- Precise interprocedural choppingPublished by Association for Computing Machinery (ACM) ,1995