{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:07:04Z","timestamp":1729660024116,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1109\/ccgrid.2005.1558545","type":"proceedings-article","created":{"date-parts":[[2005,12,22]],"date-time":"2005-12-22T12:52:37Z","timestamp":1135255957000},"page":"140-145 Vol. 1","source":"Crossref","is-referenced-by-count":2,"title":["An adaptive instrumented node for efficient anomalies and misuse detections in HPC environment"],"prefix":"10.1109","author":[{"given":"F.","family":"Gadaud","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M.","family":"Blanc","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"F.","family":"Combeau","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1109\/2.485845"},{"key":"17","first-page":"69","article-title":"VAMPIR: Visualization and analysis of MPI resources","volume":"12","author":"nagel","year":"1996","journal-title":"Supercomputer"},{"year":"0","journal-title":"Live Patching","key":"18"},{"year":"0","key":"15"},{"key":"16","first-page":"29","article-title":"Integrating flexible support for security policies into the Linux operating system","author":"loscocco","year":"2001","journal-title":"USENIX Annual Technical Conference Freenix track"},{"key":"13","article-title":"Hardened OS exploitation techniques","volume":"46","author":"krahmer","year":"2004","journal-title":"LNI"},{"key":"14","article-title":"Data mining approaches for intrusion detection","author":"lee","year":"1998","journal-title":"Proceedings of the 7th USENIX Security Symposium"},{"key":"11","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","article-title":"Intrusion detection using sequences of system calls","volume":"6","author":"hofmeyr","year":"1998","journal-title":"Journal of Computer Security"},{"year":"0","author":"jim","journal-title":"Achieving order through CHAOS The LLNL HPC Linux Cluster Experience","key":"12"},{"year":"0","author":"spengler","key":"21"},{"year":"2002","author":"smalley","journal-title":"Implementing SELinux as a Linux Security Module","key":"20"},{"year":"2001","author":"truong","journal-title":"On Using SCALEA for Performance Analysis of Distributed and Parallel Programs","key":"22"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"24","article-title":"Cluster security as a unique problem with emergent properties: Issues and techniques","author":"yurcik","year":"2004","journal-title":"The 7th LCI International Conference on Linux Clusters"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1109\/LCN.2004.1"},{"key":"3","first-page":"127","article-title":"A domain and type enforcement UNIX prototype","author":"badger","year":"1995","journal-title":"Proceedings of the Fifth USENIX UNIX Security Symposium"},{"year":"2000","author":"axelsson","journal-title":"Intrusion Detection Systems A Survey and Taxonomy","key":"2"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/CCGRID.2002.1017114"},{"key":"1","article-title":"Digsig: Run-time authentication of binaries at kernel level","author":"apvrille","year":"2004","journal-title":"Proceedings of the 18th Large Installation Systems Administration Conference"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1177\/109434200001400303"},{"key":"6","first-page":"100","article-title":"Ai techniques applied to high performance computing intrusion detection","volume":"2","author":"siraj","year":"2002","journal-title":"Proceeding of the Tenth International Conference on Telecommunication Systems Modeling and Analysis"},{"key":"5","first-page":"29","article-title":"Trusted Linux systems and application to a cluster architecture","volume":"36","author":"blanc","year":"2004","journal-title":"Proceedings of the International Symposium on Cooperative Technologies and Systems"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/332051.332079"},{"key":"9","first-page":"926","article-title":"A performance prediction framework for scientific applications","author":"carrington","year":"2003","journal-title":"International Conference on Computational Science"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1177\/109434200001400404"}],"event":{"name":"CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005.","start":{"date-parts":[[2005,5,9]]},"location":"Cardiff, Wales, UK","end":{"date-parts":[[2005,5,12]]}},"container-title":["CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10428\/33121\/01558545.pdf?arnumber=1558545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T01:12:11Z","timestamp":1555031531000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1558545\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ccgrid.2005.1558545","relation":{},"subject":[],"published":{"date-parts":[[2005]]}}}