Login / Signup
Intrusion Recovery Using Selective Re-execution.
Taesoo Kim
Xi Wang
Nickolai Zeldovich
M. Frans Kaashoek
Published in:
OSDI (2010)
Keyphrases
</>
failure recovery
intrusion detection
intrusion detection system
network security
anomaly detection
execution environment
distributed databases
error detection
execution model
real time
data sets
artificial intelligence
social networks
multiscale
source code
database
plan execution