An Empirical Comparison of Monitoring Algorithms for Access Anomaly Detection (Classic Reprint)

An Empirical Comparison of Monitoring Algorithms for Access Anomaly Detection (Classic Reprint)
Categories: Computers, Monitor
24.89 CAD
Buy Now

Excerpt from An Empirical Comparison of Monitoring Algorithms for Access Anomaly Detection

Detecting access anomalies by monitoring program execution is proposed in 12. 10, 11, Using this approach, access anomaly are detected much in the same manner that array subscript range checking is per formed. When a variable is accessed during execution, an immediate check is make to see whether the access conflicts with a previous access, in which case the error is reported. This approach may be used in conjunction with static analysis 5, 2] and is much more efficient that trace-based post - mortem methods 1, 3.

About the Publisher

Forgotten Books publishes hundreds of thousands of rare and classic books. Find more at www.forgottenbooks.com

This book is a reproduction of an important historical work. Forgotten Books uses state-of-the-art technology to digitally reconstruct the work, preserving the original format whilst repairing imperfections present in the aged copy. In rare cases, an imperfection in the original, such as a blemish or missing page, may be replicated in our edition. We do, however, repair the vast majority of imperfections successfully; any imperfections that remain are intentionally left to preserve the state of such historical works.