• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,139
Next 10 →

A Sense of Self for Unix Processes

by Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff - In Proceedings of the 1996 IEEE Symposium on Security and Privacy , 1996
"... A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process ' system calls. Initial experiments suggest that the definition is stable during normal behavior for standard UNIX programs. Further, it is able to detect several common ..."
Abstract - Cited by 689 (27 self) - Add to MetaCart
A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process ' system calls. Initial experiments suggest that the definition is stable during normal behavior for standard UNIX programs. Further, it is able to detect several common

Simulink Unix process

by D. A. Van Beek, A. T. Hofkamp, M. A. Reniers, J. E. Rooda, R. R. H. Schiffelers, Simulink Model
"... Using the model-based engineering paradigm for the design of a system, the system is decomposed into several compo-nents and models are developed for these components. The models are preferably specied using domain-specic mod-elling formalisms. By means of co-simulation, the component models can be ..."
Abstract - Add to MetaCart
-function interface as present in Matlab Simulink, to sim-ulate models that consist of subsystems modelled using Mat-lab Simulink and subsystems modelled in the hybrid process algebra Chi ( ). The principles of the implementation of the framework are described and the framework is illustrated by means of a bottle

The Unix Time-Sharing System

by D. M. Ritchie, K. Thompson - Communications of the ACM , 1974
"... Unix is a general-purpose, multi-user, interactive operating system for the larger Digital Equipment Corporation PDP-11 and the Interdata 8/32 computers. It offers a number of features seldom found even in larger operating systems, including i A hierarchical file system incorporating demountable vol ..."
Abstract - Cited by 539 (14 self) - Add to MetaCart
Unix is a general-purpose, multi-user, interactive operating system for the larger Digital Equipment Corporation PDP-11 and the Interdata 8/32 computers. It offers a number of features seldom found even in larger operating systems, including i A hierarchical file system incorporating demountable

A Sense of Self for Unix Processes

by Stephanie Forrest Steven, Steven A. Hofmeyr, Anil Somayaji - In Proceedings of the 1996 IEEE Symposium on Security and Privacy , 1996
"... A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process ' system calls. Initial experiments suggest that the definition is stable during normal behavior for standard UNIX programs. Further, it is able to detect several common ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process ' system calls. Initial experiments suggest that the definition is stable during normal behavior for standard UNIX programs. Further, it is able to detect several common

A Senseof Self for Unix Processes

by Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji
"... A method for anomaly detection is introduced in which “normal ” is defined by short-range correlations in a process’ system calls. Initial experiments suggest that the definition is stable during normal behavior for standard UNIX programs. Furthec it is able to detect several common intrusions invol ..."
Abstract - Add to MetaCart
A method for anomaly detection is introduced in which “normal ” is defined by short-range correlations in a process’ system calls. Initial experiments suggest that the definition is stable during normal behavior for standard UNIX programs. Furthec it is able to detect several common intrusions

Learning Patterns from Unix Process Execution Traces for Intrusion Detection

by Wenke Lee, Salvatore J. Stolfo, Philip K. Chan - In AAAI Workshop on AI Approaches to Fraud Detection and Risk Management , 1997
"... In this paper we describe our preliminary experiments to extend the work pioneered by Forrest (see Forrest et al. 1996) on learning the (normal and abnormal) patterns of Unix processes. These patterns can be used to identify misuses of and intrusions in Unix systems. We formulated machine learning t ..."
Abstract - Cited by 132 (20 self) - Add to MetaCart
In this paper we describe our preliminary experiments to extend the work pioneered by Forrest (see Forrest et al. 1996) on learning the (normal and abnormal) patterns of Unix processes. These patterns can be used to identify misuses of and intrusions in Unix systems. We formulated machine learning

The SAS ® Terminator: An Ultimate Killer of UNIX Processes

by unknown authors
"... As a UNIX SAS user, you may not realize that when your SAS program terminates, whether voluntarily or by external force, it may leave behind one or more UNIX processes spawned by the now dead top level process. In fact, a SAS program can create multiple generations of processes. Merely killing the p ..."
Abstract - Add to MetaCart
As a UNIX SAS user, you may not realize that when your SAS program terminates, whether voluntarily or by external force, it may leave behind one or more UNIX processes spawned by the now dead top level process. In fact, a SAS program can create multiple generations of processes. Merely killing

Towards a Dynamic Object Model within Unix Processes

by Stephen Kell
"... Programmers face much complexity from the co-existence of “native ” (Unix-like) and virtual machine (VM) “man-aged ” run-time environments. Rather than having VMs re-place Unix processes, we investigate whether it makes sense for the latter to “become VMs”, by evolving Unix’s user-level services to ..."
Abstract - Add to MetaCart
Programmers face much complexity from the co-existence of “native ” (Unix-like) and virtual machine (VM) “man-aged ” run-time environments. Rather than having VMs re-place Unix processes, we investigate whether it makes sense for the latter to “become VMs”, by evolving Unix’s user-level services

The BSD Packet Filter: A New Architecture for User-level Packet Capture

by Steven Mccanne, Van Jacobson , 1992
"... Many versions of Unix provide facilities for user-level packet capture, making possible the use of general purpose workstations for network monitoring. Because network monitors run as user-level processes, packets must be copied across the kernel/user-space protection boundary. This copying can be m ..."
Abstract - Cited by 568 (2 self) - Add to MetaCart
Many versions of Unix provide facilities for user-level packet capture, making possible the use of general purpose workstations for network monitoring. Because network monitors run as user-level processes, packets must be copied across the kernel/user-space protection boundary. This copying can

Exokernel: An Operating System Architecture for Application-Level Resource Management

by Dawson R. Engler, M. Frans Kaashoek, James O’toole , 1995
"... We describe an operating system architecture that securely multiplexes machine resources while permitting an unprecedented degree of application-specific customization of traditional operating system abstractions. By abstracting physical hardware resources, traditional operating systems have signifi ..."
Abstract - Cited by 732 (24 self) - Add to MetaCart
Aegis operations are 10–100 times faster than Ultrix,a mature monolithic UNIX operating system. ExOS implements processes, virtual memory, and inter-process communication abstractions entirely within a library. Measurements show that ExOS’s application-level virtual memory and IPC primitives are 5
Next 10 →
Results 1 - 10 of 1,139
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University