Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Virtual machining
biblio
CloudSec: A Novel Approach to Verifying Security Conformance at the Bottom of the Cloud
Submitted by grigby1 on Tue, 02/06/2018 - 1:44pm
security
model checking
openstack
pubcrawl
quality of service
real cloud scenarios
Resiliency
Scalability
SecSLA model
Metrics
Security Conformance
security constraints
security of data
security SLA
storage management
UPPAAL
Virtual machining
CloudBeh model
big data analysis
big data security metrics
Cloud Computing
Cloud Modeling
cloud service behaviors
cloud service provider
cloud service security conformance
cloud storage service
Big Data
CloudBeh performance metrics conformance
CloudSec
Computational modeling
contracts
CSP
data analysis
Measurement
biblio
Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts
Submitted by grigby1 on Tue, 01/16/2018 - 6:34pm
malware sandboxes
wear-and-tear artifacts
Virtualization
Virtual machining
tools
statistical models
statistical analysis
spotless sandboxes
security
Scalability
sandbox evasion techniques
sandbox
Resiliency
pubcrawl
Metrics
Bare-metal Host
malware analysis systems
Malware Analysis
malware
invasive software
Instruments
Human Factors
evasion
Environment Aware Malware
dynamic analysis
Decision trees
data analysis
Companies
BIOS Security
biblio
Policy-Customized: A New Abstraction for Building Security as a Service
Submitted by grigby1 on Tue, 01/16/2018 - 6:34pm
Resiliency
Virtual machining
Virtual machine monitors
Trusted Cloud Service
Servers
security policies
Security on Demand
security
Scalability
Cloud Computing
Remote Attestation
pubcrawl
Protocols
Policy-Customized
Pervasive Computing Security
Metrics
Human Factors
computer architecture
biblio
Hosting distributed databases on internet of things-scale devices
Submitted by grigby1 on Tue, 01/16/2018 - 6:33pm
Resiliency
pervasive computing
Pervasive Computing Security
physical devices
processing workload
pubcrawl
racked servers
Random access memory
Raspberry Pi
performance evaluation
Scalability
security
sensor nets
storage
system resiliency
testing
virtual machines
Virtual machining
Internet of Things
Cassandra distributed database
computation power
decentralized architecture
Distributed databases
distributed device deployment
Hardware
Human Factors
interconnected devices
benchmarks
Internet of Things-scale devices
IoT nodes
IoT representative devices
IoT-representative device specifications
Metrics
mobile computing
network compression
node configuration
biblio
Machine Learning Based DDoS Attack Detection from Source Side in Cloud
Submitted by grigby1 on Tue, 01/16/2018 - 6:24pm
machine learning based DDoS attack detection
Virtual machining
virtual machines
Virtual machine monitors
virtual machine monitor
telecommunication computing
statistical information
statistical analysis
Servers
Resiliency
pubcrawl
network traffic
network security
network packages
Metrics
Cloud Computing
machine learning algorithms
machine learning
learning (artificial intelligence)
Human behavior
feature extraction
Denial of Service attacks
DDoS attack detection
DDoS Attack
computer network security
Computer crime
composability
cloud server hypervisor
cloud provider
biblio
An Experimental Evaluation of a Cloud-Based Virtual Computer Laboratory Using Openstack
Submitted by grigby1 on Thu, 12/28/2017 - 1:36pm
Policy-Governed Secure Collaboration
Virtualization
Virtual machining
Virtual machine monitors
Virtual Computer Lab
Servers
Science of Security
Scalability
Resiliency
pubcrawl
Cloud Computing
openstack
Metrics
Human Factors
Human behavior
Experimental Evaluation
computer architecture
Computational modeling
composability
collaboration
biblio
Scalability of Cloud Based SCIT-MTD
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
moving target defense
Web application
Virtual machining
share-nothing architecture pattern
Servers
self cleansing intrusion tolerance
security of data
security
SCIT
Scalability
Resiliency
quality attributes
pubcrawl
multiple instance system
multinode system
attack surface
malicious intrusions
load demand modeling
intrusion tolerance
internet
Data protection
cybersecurity protection
continuous rotation
computer architecture
composability
cloud infrastructure services
Cloud Computing
cloud based SCIT-MTD scalability
cloud
biblio
Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
Intrusion Detection
Virtualization
Virtual machining
Virtual machine monitors
security of data
Resiliency
quality of service
QoS
pubcrawl
monitoring techniques
Monitoring
intrusion tolerance
intrusion prevention mechanisms
attack tolerance
internet
H2020 CLARUS project
data confidentiality
data availability
composability
cloud-specific attacks
cloud vulnerabilities
cloud environments
Cloud Computing
cloud
CLARUS approach
attack-tolerance
biblio
AnomalyDetect: Anomaly Detection for Preserving Availability of Virtualized Cloud Services
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
Kalman filter
virtualized cloud services
Virtual machining
virtual machines
Time series analysis
software fault tolerance
security of data
Scalability
Resiliency
pubcrawl
potential anomalies forecasting
Monitoring
Metrics
Live Migration of Virtual Machines
live migration
Kalman filters
Anomaly Detection
interconnected virtual machines
Intelligent systems
historical data
Detectors
cloud services migration
cloud services
Cloud Security
cloud disruption
Cloud Computing
Autonomic Security
Autonomic Cloud Security
autonomic cloud availability
AutoMigrate framework
AnomalyDetect approach
biblio
Transitioning Native Application into Virtual Machine by Using Hardware Virtualization Extensions
Submitted by grigby1 on Mon, 11/20/2017 - 12:31pm
security
operating system service virtualization
Policy
policy-based governance
process maliciousness
process virtual machine
program flow control
pubcrawl
sandbox
sandboxing
operating system kernels
system call virtualization
untrusted application behaviour control
untrusted application behaviour monitoring
virtual machine equivalent isolation
virtual machines
Virtual machining
virtualisation
Virtualization
hardware virtualization extensions
composability
confined malicious application
execution overheads
file system access
Governance
Government
Hardware
Hardware virtualization
code vulnerabilities
isolation
Kernel
kernel operating system
Libraries
Linux
Linux process
Memory management
operating system
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »