The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Chad Verbowski: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yi-Min Wang, Chad Verbowski, Daniel R. Simon
    Persistent-State Checkpoint Comparison for Troubleshooting Configuration Failures. [Citation Graph (0, 0)][DBLP]
    DSN, 2003, pp:311-316 [Conf]
  2. Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski
    Detecting Stealth Software with Strider GhostBuster. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:368-377 [Conf]
  3. John Dunagan, Roussi Roussev, Brad Daniels, Aaron Johnson, Chad Verbowski, Yi-Min Wang
    Towards a Self-Managing Software Patching Process Using Black-Box Persistent-State Manifests. [Citation Graph (0, 0)][DBLP]
    ICAC, 2004, pp:106-113 [Conf]
  4. Chad Verbowski, John Dunagan, Brad Daniels, Yi-Min Wang
    Experience Talk: FDR: A Flight Data Recorder Using Black-BoxAnalysis of Persistent State Changes for Managing Change and Configuration. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  5. Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, Sy-Yen Kuo
    Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:33-46 [Conf]
  6. Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang
    STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:159-172 [Conf]
  7. Chad Verbowski
    System Administration: Drowning in Management Complexity. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  8. Chad Verbowski, Juhan Lee, Xiaogang Liu, Roussi Roussev, Yi-Min Wang
    LiveOps: Systems Management as a Service. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:187-203 [Conf]
  9. Shuo Chen, John Dunagan, Chad Verbowski, Yi-Min Wang
    A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  10. Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King
    Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  11. Chad Verbowski, Emre Kiciman, Arunvijay Kumar, Brad Daniels, Shan Lu, Juhan Lee, Yi-Min Wang, Roussi Roussev
    Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management. [Citation Graph (0, 0)][DBLP]
    OSDI, 2006, pp:117-130 [Conf]
  12. Chad Verbowski, Emre Kiciman, Brad Daniels, Yi-Min Wang, Roussi Roussev, Shan Lu, Juhan Lee
    Analyzing persistent state interactions to improve state management. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS/Performance, 2006, pp:363-364 [Conf]
  13. Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch
    SubVirt: Implementing malware with virtual machines. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:314-327 [Conf]
  14. Yi-Min Wang, Lili Qiu, Chad Verbowski, Dimitris Achlioptas, Gautam Das, Per-Åke Larson
    Summary-based routing for content-based event distribution networks. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:5, pp:59-74 [Journal]
  15. Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang
    Strider: a black-box, state-based approach to change and configuration management and support. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2004, v:53, n:2, pp:143-164 [Journal]

Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002