Proceedings of the 1st Workshop on Middleware-Application Interaction, MAI 2007, in conjunction with Euro-Sys 2007, Lisbon, Portugal, March 20, 2007
Proceedings of the 2nd workshop on Middleware-application interaction - affiliated with the DisCoTec federated conferences 2008, MAI ’08, Oslo, Norway, June 3, 2008
Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems, VDTS ’09, Nuremberg, Germany, March 31, 2009
Proceedings of the 3rd International DiscCoTec Workshop on Middleware-Application Interaction, MAI ’09, Lisbon, Portugal, June 12, 2009
Malicious Fault Tolerance: From Theoretical Algorithms to an Efficient Application Development Process
Optimizing Byzantine Consensus for Fault-Tolerant Embedded Systems with Ad-Hoc and Infrastructure Networks
CloudPhylactor: Harnessing Mandatory Access Control for Virtual Machine Introspection in Cloud Environments
CloudPhylactor: Harnessing Mandatory Access Control for Virtual Machine Introspection in Cloud Environments
Distributed Applications and Interoperable Systems - 17th IFIP WG 6.1 International Conference, DAIS 2017, Held as Part of the 12th International Federated Conference on Distributed Computing Techniques, DisCoTec 2017, Neuchâtel, Switzerland, June 19-22, 2017, Proceedings
Towards a generic architecture for interactive cost-aware visualization of monitoring data in distributed systems
Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots using Virtual Machine Introspection
VMIGuard: Detecting and Preventing Service Integrity Violations by Malicious Insiders Using Virtual Machine Introspection
SSHkex: Leveraging virtual machine introspection for extracting SSH keys and decrypting SSH network traffic
“The Need for Speed”: Extracting Session Keys From the Main Memory Using Brute-force and Machine Learning
SmartVMI: Reconstructing meaningful kernel-level and application-level information about a target system using machine learning
Secure IT Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings
The view on systems monitoring and its requirements from future Cloud-to-Thing applications and infrastructures
Utilizing Similarity for Improved Intrusion Detection: Autonomous Community Formation for Practical Heterogeneity Management