Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Virtual machining
biblio
Security attack mitigation framework for the cloud
Submitted by BrandonB on Tue, 05/05/2015 - 10:17am
security guarantee
Markov processes
mean time to security failure
MTTSF cloud
privacy losses
private data security
resource consolidation
security
Security Administration
security attack mitigation framework
Markov model
security of data
Silicon
software products
software vulnerabilities
software vulnerability exploits
virtual machine
Virtual machining
virtualisation
virtualization technology
customer trust
attack mitigation plan
availability parameter
business data leaks
Cloud Computing
cloud resource manager
cloud service
Companies
confidentiality parameter
cross-channel attacks
attack graphs
enterprise cloud computing
enterprise cloud solutions
enterprise IT infrastructure
enterprise wide information processing system
hacking techniques
information technology
integrity parameter
markov chain
biblio
Towards Scalability for Federated Identity Systems for Cloud-Based Environments
Submitted by BrandonB on Tue, 05/05/2015 - 8:45am
federated identity management systems
Virtual machining
sticky session mechanism
Shibboleth architecture
Servers
Scalability
Proposals
multitenant authorization
federated identity system scalability
authentication
Cryptographic Protocols
Cloud Computing
cloud based environments
central authentication service
central authentication protocols
CAS
authorisation
biblio
Malicious code detection model based on behavior association
Submitted by BrandonB on Thu, 04/30/2015 - 2:28pm
automation
behavior association
behavior monitor
Computers
Grammar
malicious code
Monitoring
pushdown automation
Trojan horses
Virtual machining
biblio
A novel architecture for identity management system using virtual appliance technology
Submitted by BrandonB on Thu, 04/30/2015 - 2:25pm
identity management systems
Virtualization
Virtual machining
virtual machines
virtual machine monitor platform
virtual appliance technology
virtual appliance
third party cloud
Servers
security of data
information security
computer architecture
Identity management system architecture
identity management system
Identity management
Home appliances
Hardware
green computing practices
green computing
enterprise based application
cost benefit
biblio
HVSTO: Efficient privacy preserving hybrid storage in cloud data center
Submitted by BrandonB on Thu, 04/30/2015 - 2:12pm
privacy preserving hybrid storage
Virtualization
virtualisation
Virtual machining
virtual machines
virtual machine storage
solid state disk
service infrastructure
Servers
security
privacy preserving shared storage system
Cloud Computing
large-scale cloud data center
Indexes
I/O latency performance improvement
hybrid VM storage
HVSTO
distributed structure
distributed storage
data privacy
Conferences
computer centres
biblio
Analysis of Monolithic and Microkernel Architectures: Towards Secure Hypervisor Design
Submitted by BrandonB on Thu, 04/30/2015 - 2:09pm
microkernel architectures
XEN
virtualization platform
virtualisation
Virtual machining
Virtual machine monitors
security tradeoffs
security of data
security
secure hyper visor design
networking
monolithic hyper visor architectures
monolithic architectures
monolithic architecture
monitoring interface
Monitoring
application program interfaces
microkernel architecture
micro kernel hyper visor architectures
micro architecture
management API
Kernel
hypervisor security
Hyper-V
hyper visor security
hyper calls
Hardware
ESXi
computer architecture
Cloud Computing
attack surface
biblio
Secure Live Virtual Machines Migration: Issues and Solutions
Submitted by BrandonB on Thu, 04/30/2015 - 2:02pm
Servers
X.805 security standard
workload balancing
VMM
Virtualization
Virtual machining
virtual machines
Virtual machine monitors
virtual machine monitor
authentication
security of data
online system maintenance
live virtual machine migration
Internet server
Hardware
fault tolerance
cloud-based service
Cloud Computing
biblio
Semi-synthetic data set generation for security software evaluation
Submitted by BrandonB on Thu, 04/30/2015 - 1:49pm
intrusion detection and prevention systems
virus infestation
Virtual machining
testing
synthetic data set generation
semisynthetic data set generation
self-learning intrusion detection systems
security software evaluation
security of data
scalable system behavior model
anomaly detection evaluation
Intrusion Detection
information and communication technology systems
ICT systems
ICT security systems
heuristic detection engines
Databases
Data models
data handling
Complexity theory
biblio
Hypervisor-based cloud intrusion detection system
Submitted by BrandonB on Thu, 04/30/2015 - 1:25pm
multitenancy
virtualization technology
Virtualization
virtualisation
Virtual machining
virtual machines
virtual machine performance metrics
Virtual machine monitors
software metrics
Software Architecture
shared resource utilization
received packets
packet transmission
operating system
block device read requests
Measurement
intrusion detection security
Intrusion Detection
hypervisor-based cloud intrusion detection system
hypervisor performance metrics
hypervisor
CPU utilization
computer network security
Computer crime
cloud features
cloud computing resources
Cloud Computing
block device write requests
biblio
Multi-Aspect, Robust, and Memory Exclusive Guest OS Fingerprinting
Submitted by BrandonB on Thu, 04/30/2015 - 12:41pm
Linux
Virtual machining
virtual machine introspection
physical memory dump
OS-SOMMELIER
operating system precise fingerprinting
Operating system fingerprinting
multiaspect memory exclusive approach
Memory Forensics
memory exclusive guest OS fingerprinting
Linux kernels
Cloud Computing
kernel data signature
kernel code aspect
Forensics
Fingerprint recognition
digital signatures
Digital Forensics
data structures
computer security
code signature approach
code hash based approach
« first
‹ previous
…
4
5
6
7
8
9
10
11
12