Search For:

Displaying 1-5 out of 5 total
A Scalable SIEM Correlation Engine and Its Application to the Olympic Games IT Infrastructure
Found in: 2013 Eighth International Conference on Availability, Reliability and Security (ARES)
By Valerio Vianello,Vincenzo Gulisano,Ricardo Jimenez-Peris,Marta Patino-Martinez,Ruben Torres,Rodrigo Diaz,Elsa Prieto
Issue Date:September 2013
pp. 625-629
The security event correlation scalability has become a major concern for security analysts and IT administrators when considering complex IT infrastructures that need to handle gargantuan amounts of events or wide correlation window spans. The current cor...
 
StreamCloud: An Elastic and Scalable Data Streaming System
Found in: IEEE Transactions on Parallel and Distributed Systems
By Vincenzo Gulisano,Ricardo Jiménez-Peris,Marta Patiño-Martínez,Claudio Soriente,Patrick Valduriez
Issue Date:December 2012
pp. 2351-2365
Many applications in several domains such as telecommunications, network security, large-scale sensor networks, require online processing of continuous data flows. They produce very high loads that requires aggregating the processing capacity of many nodes...
 
StreamCloud: A Large Scale Data Streaming System
Found in: Distributed Computing Systems, International Conference on
By Vincenzo Gulisano, Ricardo Jimenez-Peris, Marta Patino-Martinez, Patrick Valduriez
Issue Date:June 2010
pp. 126-137
Data streaming has become an important paradigm for the real-time processing of continuous data flows in domains such as finance, telecommunications, networking, Some applications in these domains require to process massive data flows that current technolo...
 
T-Fuzz: Model-Based Fuzzing for Robustness Testing of Telecommunication Protocols
Found in: 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation (ICST)
By William Johansson,Martin Svensson,Ulf E. Larson,Magnus Almgren,Vincenzo Gulisano
Issue Date:March 2014
pp. 323-332
Telecommunication networks are crucial in today's society since critical socio-economical and governmental functions depend upon them. High availability requirements, such as the "five nines" uptime availability, permeate the development of telec...
 
STONE: a stream-based DDoS defense framework
Found in: Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC '13)
By Mar Callau-Zori, Marina Papatriantafilou, Marta Patiño-Martínez, Ricardo Jiménez-Peris, Vincenzo Gulisano, Zhang Fu
Issue Date:March 2013
pp. 807-812
An effective Distributed Denial of Service (DDoS) defense mechanism must guarantee legitimate users access to an Internet service masking the effects of possible attacks. That is, it must be able to detect threats and discard malicious packets in a online ...
     
 1