Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Virtual machining
biblio
To Detect Malware attacks for an Autonomic Self-Heal Approach of Virtual Machines in Cloud Computing
Submitted by grigby1 on Mon, 03/09/2020 - 1:25pm
public cloud services
Virtual machining
virtual machines memory snapshots API call sequences
virtual machines
virtual machine snapshots
virtual machine security
Virtual machine monitors
unsupervised machine
unattacked virtual machine memory snapshots
supervised machine learning techniques
self-heal approach
self-heal algorithm
Self-Heal
security features
security
API calls
pubcrawl
private cloud environment
private cloud
operating systems
Monitoring
malware attacks
malware
machine learning algorithms
learning (artificial intelligence)
invasive software
Cloud Computing
attack model
application program interfaces
biblio
Bytecode Heuristic Signatures for Detecting Malware Behavior
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
virtual machines
predictability
Security Heuristics
signature
reactive security solutions
proactive behavior heuristics
proactive approaches
malicious applications
heuristic
hash-based signatures
bytecode heuristic signatures
bytecode
behavior based detection
behavior
response time
Instruction sets
Monitoring
Computer languages
low performance overhead
Prototypes
malware behavior
computational complexity
Virtual machining
digital signatures
pubcrawl
Resiliency
invasive software
malware detection
security
malware
Scalability
biblio
Detecting and Analyzing Zero-Day Attacks Using Honeypots
Submitted by aekwall on Mon, 01/20/2020 - 12:05pm
Predictive Metrics
Zero-day attacks
zero-day attack detection
zero-day attack analysis
Zero Day Attacks and Defense
Virtual machining
virtual machines
virtual machine
Snort intrusion prevention system
Snort intrusion detection system
security vulnerability
security
Resiliency
pubcrawl
Protocols
Zero day attacks
Ports (Computers)
operating systems
malware
IP networks
invasive software
intrusion detec- tion/prevention system
information security domain
honeypot system
honeypot
Dictionaries
computer network security
computer network
composability
defense
biblio
Cloud Service Risk in the Smart Grid
Submitted by aekwall on Mon, 03/18/2019 - 9:54am
power engineering computing
Virtual machining
smart power grids
Smart Grids
smart grid security
Smart Grid
security risk
security of data
security
Scalability
Risk
Resiliency
pubcrawl
computational intelligence
multilayered index system
Metrics
Indexes
index system
general technical risks
evaluation
cost-effective power management
cloud service risk
cloud service
Cloud Computing
usiness
biblio
VM processes state detection by hypervisor tracing
Submitted by grigby1 on Mon, 01/21/2019 - 12:18pm
virtualisation
security
Trace Compass
virtual machine
Virtual machine monitors
virtual machines
Virtual machining
Virtual Process
virtual Process State Detection algorithm
Resiliency
Virtualization
virtualization privacy
VM processes state detection
VM trace analysis algorithm
vPSD
Wait Analysis
wait state
Instruction sets
Cloud Computing
cloud environments
composability
Data collection
host hypervisor
host kernel tracing
Human behavior
hypervisor tracing
cloud
interactive trace viewer
Metrics
Monitoring
Performance analysis
physical host level
privacy
pubcrawl
biblio
Detecting DDoS Attack in Cloud Computing Using Local Outlier Factors
Submitted by grigby1 on Mon, 01/21/2019 - 12:18pm
Symbolic Aggregate Approximation
Human behavior
Intrusion Detection
local outlier factors
lower false alarm rate
Metrics
privacy
pubcrawl
Resiliency
higher detection rates
Training
virtual machine security
virtual machines
Virtual machining
virtualisation
virtualization privacy
virtualization technique
WEKA
computer network security
authorization
Availability
basic integrity
Cloud Computing
cloud computing environment
cloud service provider
composability
Computer crime
authentication
Conferences
confidentiality
data storage
DDoS attack detection
Dimensional Reasoning
distributed denial of service attack
DR-LOF
biblio
A Survey on Security of Cloud Environment: Threats, Solutions, and Innovation
Submitted by grigby1 on Wed, 11/14/2018 - 1:15pm
malicious behavior detection
VMI
Virtual machining
virtual machines
Virtual machine monitors
virtual machine monitor
virtual machine introspection techniques
tenant network
security of data
security
Resiliency
resilience
pubcrawl
Monitoring
misuse detection techniques
malware
attack taxonomy
machine learning
intrusion detection techniques
expandability
data mining techniques
Data mining
Compositionality
CloudVMI
CloudI
Cloud Security
cloud introspection
cloud computing environment
Cloud Computing
block chain technology
behavior analysis
biblio
VM live migration time reduction using NAS based algorithm during VM live migration
Submitted by grigby1 on Wed, 07/18/2018 - 10:14am
unnecessary duplicated data transfer
Signal processing algorithms
SLA
storage data
storage management
Stress
system files
system maintenance
telecommunication traffic
Service Level Agreement
Virtual machine monitors
virtual machines
Virtual machining
virtualisation
Virtualization
virtualization environment
VM live migration time reduction
zero downtime
live virtual machine migration
computer centres
datacenters
file servers
hash map-based algorithm
I-O operations
I-O Systems
i-o systems security
live migration
Cloud Computing
NAS
NAS-based algorithm
network traffic
pubcrawl
Random access memory
random-access storage
Scalability
Servers
biblio
Game-theory based detection and prevention of DoS attacks on networking node in open stack private cloud
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
openstack
vulnerability detection
Virtualization
Virtual machining
Stochastic game
Stochastic Computing Security
Servers
security
Resiliency
pubcrawl
cloud
Metrics
IP networks
Human behavior
Games
Game-Theory
DoS attack
DHCP attack
Compositionality
Cloud Computing
biblio
CyberMoat: Camouflaging Critical Server Infrastructures with Large Scale Decoy Farms
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
information gathering
Attack detection
attacker reconnaissance
authentication
critical server camouflaging
critical server infrastructures
CyberMoat
deception-based cyber defenses
decoy platform
decoy systems
decoy-enhanced defense framework
deployed decoys
dynamic proxy address shuffling
Fingerprint recognition
high-fidelity decoy servers
Virtual machining
Monitoring
Network reconnaissance
pubcrawl
Reconnaissance
Resiliency
defense mechanisms
security of data
Servers
service availability
static decoy configurations
targeted remote attacks
telecommunication security
transparent connection translation strategy
versatile front-end proxies
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »