Active Bibliography

50 Storage-based intrusion detection: watching storage activity for suspicious behavior – Adam G. Pennington, John D. Strunk, John Linwood Griffin, Craig A. N. Soules, Garth R. Goodson, Gregory R. Ganger - 2003
1 Timing-Accurate Storage Emulation: Evaluating Hypothetical Storage Components – John Linwood Griffin
490 Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software – James Newsome, Dawn Song - 2005
451 Agile Application-Aware Adaptation for Mobility – Brian D. Noble, M. Satyanarayanan, Dushyanth Narayanan, James Eric Tilton, Jason Flinn, Kevin R. Walker - 1997
413 Vulnerabilities Analysis – Matt Bishop - 1999
405 Small Byzantine Quorum Systems – Jean-Philippe Martin, Lorenzo Alvisi, Michael Dahlin - 2001
367 Dynamo: amazon’s highly available key-value store – Giuseppe DeCandia, Deniz Hastorun, Madan Jampani, Gunavardhan Kakulapati, Avinash Lakshman, Alex Pilchin, Swaminathan Sivasubramanian, Peter Vosshall, Werner Vogels - 2007
361 EMERALD: Event monitoring enabling responses to anomalous live disturbances – Phillip A. Porras, Peter G. Neumann - 1997
348 ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay – George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza A. Basrai, Peter M. Chen - 2002