Towards real-time enabled Microsoft Windows
Proceedings of the 5th ACM international conference on Embedded software
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Proceedings of the 12th ACM conference on Computer and communications security
NETRA:: seeing through access control
Proceedings of the fourth ACM workshop on Formal methods in security
The Design of New Journaling File Systems: The DualFS Case
IEEE Transactions on Computers
Automated extraction of behavioural profiles from document usage
BT Technology Journal
TxLinux: using and managing hardware transactional memory in an operating system
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
XFI: software guards for system address spaces
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
The design of framework for detecting an insider's leak of confidential information
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Prevention of information attacks by run-time detection of self-replication in computer codes
Journal of Computer Security
u-PC: personal workspace on a portable storage
Mobility '07 Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology
Effective Visualization of File System Access-Control
VizSec '08 Proceedings of the 5th international workshop on Visualization for Computer Security
An information retrieval process to aid in the analysis of code clones
Empirical Software Engineering
Portable desktop applications based on P2P transportation and virtualization
LISA'08 Proceedings of the 22nd conference on Large installation system administration conference
Hypervisor support for identifying covertly executing binaries
SS'08 Proceedings of the 17th conference on Security symposium
Task-aware virtual machine scheduling for I/O performance.
Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on Virtual execution environments
Sorting Reordered Packets with Interrupt Coalescing
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Framework for Behavior-Based Malware Analysis in the Cloud
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Reducing performance non-determinism via cache-aware page allocation strategies
Proceedings of the first joint WOSP/SIPEW international conference on Performance engineering
FlashVM: revisiting the virtual memory hierarchy
HotOS'09 Proceedings of the 12th conference on Hot topics in operating systems
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks
Proceedings of the 26th Annual Computer Security Applications Conference
Transparently bridging semantic gap in CPU management for virtualized environments
Journal of Parallel and Distributed Computing
Time based data forensic and cross-reference analysis
Proceedings of the 2011 ACM Symposium on Applied Computing
An online cross view difference and behavior based kernel rootkit detector
ACM SIGSOFT Software Engineering Notes
Ginpex: deriving performance-relevant infrastructure properties through goal-oriented experiments
Proceedings of the joint ACM SIGSOFT conference -- QoSA and ACM SIGSOFT symposium -- ISARCS on Quality of software architectures -- QoSA and architecting critical systems -- ISARCS
Page coloring synchronization for improving cache performance in virtualization environment
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part III
Investigating the PROCESS block for memory analysis
ACS'11 Proceedings of the 11th WSEAS international conference on Applied computer science
Spy vs. Spy: counter-intelligence methods for backtracking malicious intrusions
Proceedings of the 2011 Conference of the Center for Advanced Studies on Collaborative Research
ELI: bare-metal performance for I/O virtualization
ASPLOS XVII Proceedings of the seventeenth international conference on Architectural Support for Programming Languages and Operating Systems
Prevention of information attacks by run-time detection of self-replication in computer codes
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
An approach for indexing file names in a directory
Proceedings of the 13th International Conference on Computer Systems and Technologies
A windows-based parallel file system
HPCC'07 Proceedings of the Third international conference on High Performance Computing and Communications
VSwapper: a memory swapper for virtualized environments
Proceedings of the 19th international conference on Architectural support for programming languages and operating systems
Virtual ghost: protecting applications from hostile operating systems
Proceedings of the 19th international conference on Architectural support for programming languages and operating systems
The Journal of Supercomputing
Hi-index | 0.01 |
The premier guide to the Windows kernel now covers Windows Server 2003, Windows XP, and Windows 2000, including 64-bit extensions. Get the architectural perspectives and insider insights needed to unlock the power of Windows.