Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Virtual machining
biblio
Solving the Interdependency Problem: A Secure Virtual Machine Allocation Method Relying on the Attacker’s Efficiency and Coverage
Submitted by grigby1 on Thu, 07/08/2021 - 2:24pm
Virtual machining
virtual machine security
interdependency problem
hypervisor
Cyber Physical System
Investment
virtual machine
resource management
Virtual machine monitors
Cryptography
composability
Resiliency
resilience
pubcrawl
Servers
security
Cloud Computing
biblio
Negative Feedback Dynamic Scheduling Algorithm based on Mimic Defense in Cloud Environment
Submitted by aekwall on Wed, 07/07/2021 - 5:11pm
mimic defense
composability
virtualization privacy
Human behavior
Resiliency
Metrics
pubcrawl
negative feedback control
Negative feedback
Monitoring
Heuristic algorithms
Dynamic scheduling
cloud environment
Virtual machining
real-time systems
Cloud Computing
privacy
biblio
The Million Dollar Handshake: Secure and Attested Communications in the Cloud
Submitted by grigby1 on Wed, 05/05/2021 - 12:58pm
Remote Attestation
Virtual machining
standards
Software
secure enclaves
secure communication
Scalability
sandboxing
rendering (computer graphics)
attestation
pubcrawl
Protocols
policy-based governance
composability
Communication channels
collaboration agreements
collaboration
Cloud Computing
biblio
Transparent IDS Offloading for Split-Memory Virtual Machines
Submitted by grigby1 on Fri, 04/09/2021 - 11:35am
IDS
VMemTrans
VM migration
VM introspection
transparent IDS offloading
split-memory VM
split-memory virtual machines
split migration
remote hosts
offloaded IDS
multiple hosts
large-memory VM
IDS offloading
exchanges memory data
access VM remote memory
security of data
Instruction sets
resilience
virtual machines
Virtual machining
maintenance engineering
Memory management
Runtime
composability
Big Data
Resiliency
pubcrawl
Intrusion Detection Systems
Monitoring
biblio
Implementation of SDN-based IDS to protect Virtualization Server against HTTP DoS attacks
Submitted by grigby1 on Fri, 04/09/2021 - 11:33am
resilience
virtualization servers
virtualization server
virtualization environments
SDN-based security applications
SDN-based IDS
intrusion attacks
HTTP DoS attacks
HTTP DoS
SDN networks
SDN technology
denial-of-service attack
network traffic analysis
IDS
network intrusion detection system
cloud
Cloud Computing
Virtualization
Virtual machining
malicious software
virtualisation
Switches
software defined networking
SDN
Denial of Service attacks
telecommunication traffic
composability
web services
computer network security
Resiliency
pubcrawl
Servers
biblio
Performance Analysis of IDS Snort and IDS Suricata with Many-Core Processor in Virtual Machines Against Dos/DDoS Attacks
Submitted by grigby1 on Fri, 04/09/2021 - 11:32am
Central Processing Unit
testing
virtual machine
Performance analysis
IDS
Telecommunications
transport protocols
DoS
denial-of-service attack
operating systems (computers)
IDS Snort version
IDS Suricata
many-core processor
physical machine
Snort
Suricata
TCP Flood attack test
IP networks
resilience
DDoS
virtual machines
Virtual machining
DDoS Attacks
multiprocessing systems
telecommunication traffic
composability
Wireless communication
intrusion detection system
wireless sensor networks
microprocessor chips
computer network security
Resiliency
pubcrawl
biblio
Federated TONİoT Windows Datasets for Evaluating AI-Based Security Applications
Submitted by grigby1 on Thu, 03/04/2021 - 2:43pm
privacy
Windows operating systems
Windows Operating System Security
Windows operating system
virtualization privacy
Virtual machining
virtual machine security
virtual machine
testbed
security
Resiliency
resilience
pubcrawl
Linux Operating System Security
operating systems
Metrics
Intrusion Detection
Internet of Things
Human behavior
Federated datasets
data privacy
Computer crime
composability
Cloud Computing
AI-based security applications
biblio
A Practical Exercise System Using Virtual Machines for Learning Cross-Site Scripting Countermeasures
Submitted by grigby1 on Wed, 02/10/2021 - 1:19pm
Resiliency
XSS countermeasures
XSS attacks
Web servers
Web server
Web pages
Web Browser Security
Web browser
web applications
Virtual machining
virtual machines
tools
Software
security of data
Scalability
virtual machine security
resilience
public domain software
pubcrawl
practical exercise system
online front-ends
learning cross-site scripting
internet
Human behavior
cross-site scripting
Cross Site Scripting
computer science education
Browsers
security
virtual machine
biblio
An Appraisal over Intrusion Detection Systems in Cloud Computing Security Attacks
Submitted by grigby1 on Wed, 02/03/2021 - 2:01pm
Intrusion Detection
wrapping attacks
Virtual machining
specific honey pot algorithm
Servers
security issues
security
Scalability
Resiliency
resilience
pubcrawl
procedural intrusion way
malware
invasive software
Intrusion Detection Systems
Browser Security
intrusion
Human Factors
Human behavior
honey pots
honey pot attack
Honey pot (computing)
Honey Pot
Flooding Attacks
common security breaches
cloud computing security attacks
Cloud Computing
browser malware-injection attacks
authentication
attacks
biblio
Investigating The Darknet
Submitted by grigby1 on Fri, 01/15/2021 - 12:24pm
Human Factors
World Wide Web criminals
Virtual machining
tools
Servers
security
Research honeypots
pubcrawl
Organizations
investigation
Internet users
internet
Automated honeypots
Human behavior
honeypots
Forensics
drugs
detection
darknet
dark web
Cybercrime
computer security mechanisms
Computer crime
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »