Active Bibliography

50 Storage-based intrusion detection: watching storage activity for suspicious behavior – Adam G. Pennington, John D. Strunk, John Linwood Griffin, Craig A. N. Soules, Garth R. Goodson, Gregory R. Ganger - 2003
6 On the Feasibility of Intrusion Detection inside Workstation Disks – John Linwood Griffin, Adam Pennington, John S. Bucy, Deepa Choundappan, Nithya Muralidharan, Gregory R. Ganger - 2003
18 Ext3cow: The Design, Implementation, and Analysis of Metadata for a Time-Shifting File System – Zachary N. J. Peterson, Randal C. Burns - 2003
54 Ext3cow: A time-shifting file system for regulatory compliance – Zachary N. J. Peterson, Randal Burns - 2005
127 Self-securing Storage: Protecting Data in Compromised Systems – John D. Strunk, Garth R. Goodson, Michael L. Scheinholtz, Craig A. N. Soules, Gregory R. Ganger - 2000
3 UCLog: A unified, correlated logging architecture for intrusion detection – Zhenmin Li, Jed Taylor, Elizabeth Partridge, Yuanyuan Zhou, William Yurcik, Cristina Abad, James J. Barlow, Jeff Rosendale - 2004
MAIDS for VoIP: A Mobile Agents-based Intrusion Detection System for Voice over Internet Protocol – Christian Chita - 2008
7 Automatic High-Performance Reconstruction and Recovery – Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Maier
10 A Model of Forensic Analysis Using Goal-Oriented Logging – Sean Philip Peisert - 2007
Behavioral feature Extraction for NETWORK ANOMALY DETECTION – James P. Early - 2005
2 Anatomy of a Real-time Intrusion Prevention System – Ricardo Koller, Raju Rangaswami, Joseph Marrero, Igor Hernandez, Geoffrey Smith, Mandy Barsilai, Silviu Necula, S. Masoud Sadjadi, Tao Li, Krista Merrill - 2007
87 Towards higher disk head utilization: extracting free bandwidth from busy disk drives – Christopher R. Lumb, Jiri Schindler, Gregory R. Ganger, David F. Nagle - 2000
REPRESENTATIVE, REPRODUCIBLE, AND PRACTICAL BENCHMARKING OF FILE AND STORAGE SYSTEMS – Nitin Agrawal, Lakshmi Bairavasundaram, John Bent, Nate Burnett, Tim Denehy, Haryadi Gunawi, Abhishek Rajimwale, Meenali Rungta, Muthian Sivathanu, Sriram Subramanian
10 Workload-Specific File System Benchmarks – Keith Arnold Smith - 2001
79 Track-aligned Extents: Matching Access Patterns to Disk Drive Characteristics – Jiri Schindler, John Linwood Griffin, Christopher R. Lumb, Gregory R. Ganger - 2002
34 A nine year study of file system and storage benchmarking – Avishay Traeger, Erez Zadok, Nikolai Joukov, Charles P. Wright - 2008
4 PERVASIVE BINDING OF LABELS TO SYSTEM PROCESSES – Florian Buchholz - 2005
2 Proof of Freshness: How to efficiently use on online single secure clock to secure shared untrusted memory – Marten Van Dijk, Luis F. G. Sarmenta, Charles W. O’donnell, Srinivas Devadas - 2006
2 Securing Shared Untrusted Storage by using TPM 1.2 Without Requiring a Trusted OS – Marten Van Dijk, Luis F. G. Sarmenta, Jonathan Rhodes, Srinivas Devadas - 2007