Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Virtual machining
biblio
Bridge the Trustworthiness Gap amongst Multiple Domains: A Practical Blockchain-based Approach
Submitted by aekwall on Mon, 12/21/2020 - 1:33pm
contracts
trustworthiness-protection system
trustworthiness management
trustworthiness gap
trusted corporations
multiple-domain business partners
malicious falsification attacks
Isolated data islands
global trustworthiness
data trustworthiness
cloud-based prototype
blockchain-based approach
Prototypes
edge computing
Cloud Computing
Virtual machining
ethereum
trustworthiness
Distributed databases
cryptocurrencies
blockchain
composability
pubcrawl
Trusted Computing
Organizations
data privacy
authorisation
biblio
Analyzing Overhead from Security and Administrative Functions in Virtual Environment
Submitted by grigby1 on Tue, 11/17/2020 - 2:41pm
para-virtualization technique
virtual environment
virtual environments
administrative component performance recommendations
Availability
guest operating systems
guest VMs
hypervisor workload
overhead analysis
operating systems
Redundancy
response time
System Availability
virtual platforms
virtualized environment
Xen-hypervisor
Operating systems security
Virtual machining
security
Servers
pubcrawl
Metrics
Resiliency
composability
system monitoring
virtualisation
security of data
Virtual machine monitors
virtual machines
load balancing
resource allocation
Bandwidth
resilience
operating systems (computers)
biblio
Personalized Learning in a Virtual Hands-on Lab Platform for Computer Science Education
Submitted by grigby1 on Wed, 11/04/2020 - 2:01pm
learner performance assessment
Virtual machining
virtual hands-on lab platform
undergraduate students
ThoTh Lab
student performance prediction
pubcrawl
privacy
personalized learning platform
Personalized Learning
personalized lab platform
online computer science education
Learning Style
Learning management systems
Arizona State University
hands-on lab
educational courses
distance learning
Data mining
cybersecurity education
cyber physical systems
computer security
computer science hands-on labs
computer science education
computer science
cloud-based personalized learning
Cloud Computing
biblio
Using Deep-Learning-Based Memory Analysis for Malware Detection in Cloud
Submitted by aekwall on Mon, 10/26/2020 - 12:13pm
dynamic analysis approach
virtual machine
virtual machines
machine-learning-based approaches
file system
Virtual machine monitors
cloud nodes
deep learning technology
deep-learning-based memory analysis
Predictive Metrics
malicious binary files
malware execution
Memory Analysis
memory analysis approach
real-world malwares
run-time overhead
zero-day malware
Monitoring
Gray-scale
Malware Analysis
Virtual machining
privacy
Metrics
deep learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
invasive software
malware detection
malware
Cloud Computing
biblio
A Novel Machine Learning Based Malware Detection and Classification Framework
Submitted by aekwall on Mon, 10/26/2020 - 12:13pm
complex malware types
Predictive Metrics
computer systems
Feature Selection
dynamic analysis
feature selection algorithms
machine learning models
classification accuracy
accurate malware detection
analysis report
classification framework
malware samples
fine-grained classification
high detection
malware analysis framework
malware files
minimum computation cost
selection module
signature-based malware detection techniques
system activities
time progresses
Training
invasive software
machine learning algorithms
feature extraction
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Metrics
pattern classification
malware
machine learning
testing
privacy
Virtual machining
Malware Analysis
cuckoo sandbox
malware classification
malware detection
static and dynamic analysis
biblio
IoT Malware Dynamic Analysis Profiling System and Family Behavior Analysis
Submitted by aekwall on Mon, 10/26/2020 - 12:11pm
family behavior analysis
Hidden Markov models
IoT malware
API call invocation
API hooking technique
automatic machine
Behavior Graph
conventional profiling methods
deployed IoT devices
virtual machines
family behavior graph
IoT malware dynamic analysis profiling system
IoT malware increases
profiling system adapts virtual machine introspection
QEMU
valuable IoT malware behavior
virtual machine introspection
Libraries
Big Data
Internet of Things
malware
invasive software
Resiliency
Human behavior
pubcrawl
Metrics
Inspection
privacy
Virtual machining
Malware Analysis
application program interfaces
dynamic analysis
Predictive Metrics
virtual machine
biblio
A New Approach to Double I/O Performance for Ceph Distributed File System in Cloud Computing
Submitted by grigby1 on Fri, 09/04/2020 - 3:15pm
local file system
distribute storage systems
Engines
faster IO performance
fault tolerant computing
hard disk
Hard disks
infrastructure-as-a-service
IO operations
cloud computing system
network operating systems
persistent storage service
storage engine
storing virtual machines
virtual machine
virtual machines
Virtual machining
BIOS Security
performance evaluation
Scalability
storage management
pubcrawl
Metrics
Resiliency
resilience
optimization
Human Factors
Cloud Computing
Throughput
Distributed databases
backend block storage service
block devices
block storage resources
block storage services
Ceph distributed file system
biblio
A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing
Submitted by grigby1 on Fri, 08/28/2020 - 12:02pm
resilience
insider attacks
Kill Chain
kill-chain approach
kill-chain based method
malicious insider
malicious insiders
Measurement
multiple indirect detection measures
Packet Sniffing
pubcrawl
insider attack
Resiliency
Scalability
security of data
Servers
SIM-card manufacturer Gemalto
Tesla
trees (mathematics)
Undetectable Attacks
virtual machines
Virtual machining
cloud-computing environment
attack tree
attack trees
attack vector
Attack vectors
attack-detection strategies
Aviva Insurance
bank data processing
cloud cluster
Cloud Computing
cloud paradigms
Chained Attacks
cloud-computing services
cloud-service environments
cloud-service providers
combined attack-tree
Companies
Computer crime
Google
Human behavior
Indirect Detection
indirect detection opportunities
biblio
Research on Time Concealed Channel Technology of Cloud Computing Platform Based on Shared Memory
Submitted by grigby1 on Thu, 07/16/2020 - 12:18pm
pubcrawl
Virtualization
Virtual machining
time-covert channels
time concealed channel technology
shared memory time covert channels
shared memory systems
shared memory
security of data
security issues
security
Scalability
Resiliency
resilience
Analytical models
interference methods
Interference
Entropy
data leakage
covert channels
covert channel interference
covert channel detection
covert channel
Compositionality
composability
cloud platform
cloud computing platform
Cloud Computing
biblio
Research on Digital Forensics Framework for Malicious Behavior in Cloud
Submitted by grigby1 on Fri, 04/17/2020 - 10:29am
SDN
malicious virtual machine detection
Memory Analysis
Metrics
privacy
privacy leakage
pubcrawl
resilience
Resiliency
malicious behavior oriented framework
traceability module
virtual machines
Virtual machining
virtualisation
virtualization facility memory evidence extraction
virtualization privacy
volatile data loss problems
full-traffic flow detection technology
cloud-based malicious behavior detection mechanism
composability
Computer crime
cyber crime
cybercrimes
Digital Forensics
digital forensics framework
emergency services
Cloud Computing
Human behavior
Human Factors
IaaS service based forensics module
infection topology
information forensics
law enforcement
malicious behavior
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »