Active Bibliography

50 Storage-based intrusion detection: watching storage activity for suspicious behavior – - 2003
6 On the Feasibility of Intrusion Detection inside Workstation Disks – - 2003
18 Ext3cow: The Design, Implementation, and Analysis of Metadata for a Time-Shifting File System – - 2003
54 Ext3cow: A time-shifting file system for regulatory compliance – - 2005
127 Self-securing Storage: Protecting Data in Compromised Systems – - 2000
3 UCLog: A unified, correlated logging architecture for intrusion detection – - 2004
MAIDS for VoIP: A Mobile Agents-based Intrusion Detection System for Voice over Internet Protocol – - 2008
8 Automatic High-Performance Reconstruction and Recovery
Behavioral feature Extraction for NETWORK ANOMALY DETECTION – - 2005
11 A Model of Forensic Analysis Using Goal-Oriented Logging – - 2007
2 Anatomy of a Real-time Intrusion Prevention System – - 2007
88 Towards higher disk head utilization: extracting free bandwidth from busy disk drives – - 2000
REPRESENTATIVE, REPRODUCIBLE, AND PRACTICAL BENCHMARKING OF FILE AND STORAGE SYSTEMS
10 Workload-Specific File System Benchmarks – - 2001
79 Track-aligned Extents: Matching Access Patterns to Disk Drive Characteristics – - 2002
35 A nine year study of file system and storage benchmarking – - 2008
4 PERVASIVE BINDING OF LABELS TO SYSTEM PROCESSES – - 2005
2 Proof of Freshness: How to efficiently use on online single secure clock to secure shared untrusted memory – - 2006
2 Securing Shared Untrusted Storage by using TPM 1.2 Without Requiring a Trusted OS – - 2007