- 1 Allen, T. R. and D. Padua. Debugging Fortran on a Shared Memory Machine. Proc. International Conference on Parallel Processing, August 1987, pages 721-727.Google Scholar
- 2 Appelbe, B. and Charles E. McDowell. Developing Multitasking Applications Programs. In Proceedings of the 21st Annual Hawaii International Conference on Systems Science, pages 94-102, 1988. Google ScholarDigital Library
- 3 Bernstein, A. J. Program Analysis for Parallel Processing. Transactions on Electronic Computers, EC-15(5):757-762, October 1966.Google Scholar
- 4 Callahan, D. and K. Kennedy. Analysis of Interprocedural Side Effects in a Parallel Programming Environment. In Proceedings of the First inlernational Conference on Supercomputing, pages 139-171, june 1987. Google ScholarDigital Library
- 5 Callahan, D., K. Kennedy, and J. Subhlok. Analysis of Event Synchronization in a Parallel Programming Tool. In Proceedings of Second A CM SIGPLAN Symposium on Principles and Praclice of Parallel Programming, March 1990. Google ScholarDigital Library
- 6 Choi, Jong-Deok. Parallel Program Debugging with Flowback Analysis. PhD thesis, University of Wisconsin- Madison, 1989. Google ScholarDigital Library
- 7 Choi, Jong-Deok and S. L. Min. Race Frontier: Reproducing Data Races in Parallel-Program Debugging. Proc. of the 3rd Symposium on Principles and Practice of Parallel Programming, April 1991. Google ScholarDigital Library
- 8 Dinning, Anne. Detecting Nondeterminism in Parallel Programs. PhD thesis, New York University, October 1990. Google ScholarDigital Library
- 9 Dinning, A. and Edith Sehonberg. An Empirical Comparison of Monitoring Algorithms for Access Anomaly Detection. In Proceedings of the Second A CM SIGPLAN Symposium on Principles and Practice of Parallel Programming, pages 1 - 10, March 1990. Google Scholar
- 10 Emrath, A. and D. A. Padua. Automatic Detection of Nondeterminancy in Parallel Programs. In Proceedings of the SIGPLAN Workshop on Parallel and Distributed Debugging, pages 89-99, May 1988. Google ScholarDigital Library
- 11 Ferrante, J., K. Ottenstein, and J.D. Warren. The Program Dependence Graph and its Uses in Optimization. A CM Transaction on Programming Languages and Systems, 9(3):319- 349, July 1987. Google ScholarDigital Library
- 12 Helmbold, D.P., C.E.McDowell and J.Z. Wang. Detecting Data Races from Sequential Traces. Proc. Hawaii International Conference on System Sciences, 1991, pp. 408-417.Google ScholarCross Ref
- 13 Hood, R., K. Kennedy, and J. Mellor- Crummey. Parallel Program Debugging with On-the-fly Anomaly Detection. Supercomputing '90, November 1990. Google ScholarDigital Library
- 14 Lamport, Leslie. Time, Clocks, and the Ordering of Events in a Distributed System. Communications of the A CM, 21(7), July 1978. Google ScholarDigital Library
- 15 LeBlanc, T.J., and J.M. Mellor-Crummey. Debugging Parallel Programs with Instant Replay. IEEE Transactions on Computers, C- 36(4):471-482, April 1987. Google ScholarDigital Library
- 16 Miller, B. P. and Jong-Deok Choi. A Mechanism for Efficient Debugging of Parallel Programs. In Proceedings of the SIGPLAN Conference on Programming Language Design and implementation, June 1988. Google ScholarDigital Library
- 17 Netzer, R.I-I.B. and B.P. Miller. Detecting Data Races in Parallel Program Executions. Languages and Compilers for Parallel Comput. ing, ed. D. Gelernter, 2'. Gross, A. Nicolau, and D. Padua, MIT Press (1991). Also Proc. of the 3rd Workshop on Programming Languages and Compilers for Parallel Computing, August 1990.Google Scholar
- 18 Netzer, R.H.B. and B.P. Miller. Improving the Accuracy of Data Race Detection. Proc. of the 3rd Symposium on Principles and Practice of Parallel Programming, April 1991. Google ScholarDigital Library
- 19 Netzer, R.H.B. Private Communication, 1991.Google Scholar
- 20 Nudler, Itzhak and Larry Rudolph. Tools for the Efficient Development of Efficient Parallel Programs. Israeli .Conference on Computer System Engineering, 1988.Google Scholar
- 21 Ottenstein, K. and L. Ottenstein. The Program Dependence Graph in a Software Development Environment. Proceedings of the A CM SIGSOFT/SIBPLAN Symposium on Practical Software Development Environments, April 1984. Google ScholarDigital Library
- 22 Schonberg, Edith. On-The-Fly Detection of Access Anomalies. In Proceedings of the SIG- PLAN Conference on Programming Language Design and Implementation, June 1989. Google ScholarDigital Library
- 23 Snir, Marc. Private Communication, 1988.Google Scholar
- 24 Weiser, Mark. Program Slicing. IEEE Transactions on Software Engineering, SE- 10(4):352-357, july 1984.Google Scholar
Index Terms
- Detecting access anomalies in programs with critical sections
Recommendations
On The Limits of Detecting Process Anomalies in Critical Infrastructure
CPSS '18: Proceedings of the 4th ACM Workshop on Cyber-Physical System SecurityCritical infrastructure are Cyber-Physical Systems that provide essential services to the society. Such infrastructure includes plants for power generation and distribution and for water treatment and distribution. Several such plants operate under a ...
Detecting Network Anomalies Using CUSUM and EM Clustering
ISICA '09: Proceedings of the 4th International Symposium on Advances in Computation and IntelligenceIntrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and report a huge number of false alarms. The hybrid approach has been proposed ...
On detecting clustered anomalies using SCiForest
ECML PKDD'10: Proceedings of the 2010 European conference on Machine learning and knowledge discovery in databases: Part IIDetecting local clustered anomalies is an intricate problem for many existing anomaly detection methods. Distance-based and density-based methods are inherently restricted by their basic assumptions--anomalies are either far from normal points or being ...
Comments