Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
virtual machine introspection
biblio
Architecture for Resource-Aware VMI-based Cloud Malware Analysis
Submitted by grigby1 on Tue, 01/23/2018 - 3:52pm
Cloud Computing
Dynamic Malware Analysis
Human behavior
machine learning
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
virtual machine introspection
biblio
"Execution Time Measurement of Virtual Machine Volatile Artifacts Analyzers"
Submitted by abfox on Tue, 02/14/2017 - 1:33pm
public domain software
virtualization environment
virtualisation
Virtual machining
virtual machines
virtual machine volatile artifact analyzers
Virtual machine monitors
virtual machine introspection
virtual infrastructure privileged access
storage management
spyware
Semantics
semantic gap
rootkit
Random access memory
advanced persistent threat
pubcrawl170101
memory forensic analysis tool
memory forensic analysis
malware
live virtual machine RAM dump
LibVMI open source tool
Kernel
invasive software
intrusion detection system
hypervisor
execution time measurement
Digital Forensics
captured memory dump analysis
advanced persistent threats
biblio
Multi-Aspect, Robust, and Memory Exclusive Guest OS Fingerprinting
Submitted by BrandonB on Thu, 04/30/2015 - 12:41pm
Linux
Virtual machining
virtual machine introspection
physical memory dump
OS-SOMMELIER
operating system precise fingerprinting
Operating system fingerprinting
multiaspect memory exclusive approach
Memory Forensics
memory exclusive guest OS fingerprinting
Linux kernels
Cloud Computing
kernel data signature
kernel code aspect
Forensics
Fingerprint recognition
digital signatures
Digital Forensics
data structures
computer security
code signature approach
code hash based approach
« first
‹ previous
1
2