Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Savage, Stefan Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 4 of 4 reviews    
  Improving software diagnosability via log enhancement
Yuan D., Zheng J., Park S., Zhou Y., Savage S. ACM Transactions on Computer Systems 30(1): 1-28, 2012.  Type: Article

When a software system fails at a user site, information is often automatically sent to the developer for diagnostics. Usually, only a system log is included, with all the confidential data such as identities and financial information ...
...
Jul 6 2012  
  Privacy-preserving network forensics
Afanasyev M., Kohno T., Ma J., Murphy N., Savage S., Snoeren A., Voelker G. Communications of the ACM 54(5): 78-87, 2011.  Type: Article

The Internet offers users some anonymity; at the network level, an Internet protocol (IP) address is only loosely associated with a device, and is not associated with a person. This article proposes the use of group signatures to bind ...
...
Jul 18 2011  
  Beyond heuristics: learning to classify vulnerabilities and predict exploits
Bozorgi M., Saul L., Savage S., Voelker G.  KDD 2010 (Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, Jul 25-28, 2010) 105-114, 2010.  Type: Proceedings

Machine learning techniques are being applied to all kinds of problems in computer science. This paper applies machine learning to classifying vulnerabilities and predicting time to exploit a vulnerability, once information on it has b...
...
Nov 10 2010  
  Beyond blacklists: learning to detect malicious Web sites from suspicious URLs
Ma J., Saul L., Savage S., Voelker G.  KDD 2009 (Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, Jun 28-Jul 1, 2009) 1245-1254, 2009.  Type: Proceedings

Detecting malicious Web sites is an ongoing concern. This paper describes an “automated [uniform resource locator (URL)] classification, using statistical methods to discover the tell-tale lexical and host-based properties&am...
...
Mar 9 2010  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy