Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
virtualisation
biblio
Development of Incident Response Tool for Cyber Security Training Based on Virtualization and Cloud
Submitted by grigby1 on Fri, 04/17/2020 - 11:28am
Resiliency
Korean e-government framework
Korean government agency
Linux
Metrics
military war game modeling
modeling and simulation
pubcrawl
resilience
infringement incident response tool
scenario based infringement incident response training
Secure Coding
virtualisation
virtualization-based infringement incident response tool
vulnerability measure practice
Window operating system environments
Windows Operating System Security
actual information system
government data processing
defense practice
cyber security training system
cyber security threats
cyber security experts
cyber security
computer science education
Computer crime
computer based training
composability
Cloud Computing
cloud
CBT type remote education
artificial intelligence technology
artificial intelligenc
biblio
White Box Analysis at the Service of Low Rate Saturation Attacks on Virtual SDN Data Plane
Submitted by grigby1 on Fri, 04/17/2020 - 10:58am
Protocols
White Box Security
white box analysis
virtualisation
Virtual Switches
Virtual Switch
virtual SDN data plane
static code analysis techniques
software switch functionalities
software defined networking
security
SDN
Resiliency
resilience
pubcrawl
Cloud Computing
programmable virtual switches
OpenFlow communication protocol
Metrics
low rate saturation attacks
low rate saturation attack
legacy network protocols
effective low profile attacks
dynamic code analysis techniques
computer network security
computer centres
Compositionality
composability
cloud data center
biblio
Research on Digital Forensics Framework for Malicious Behavior in Cloud
Submitted by grigby1 on Fri, 04/17/2020 - 10:29am
SDN
malicious virtual machine detection
Memory Analysis
Metrics
privacy
privacy leakage
pubcrawl
resilience
Resiliency
malicious behavior oriented framework
traceability module
virtual machines
Virtual machining
virtualisation
virtualization facility memory evidence extraction
virtualization privacy
volatile data loss problems
full-traffic flow detection technology
cloud-based malicious behavior detection mechanism
composability
Computer crime
cyber crime
cybercrimes
Digital Forensics
digital forensics framework
emergency services
Cloud Computing
Human behavior
Human Factors
IaaS service based forensics module
infection topology
information forensics
law enforcement
malicious behavior
biblio
Designing Security-Aware Service Requests for NFV-Enabled Networks
Submitted by grigby1 on Fri, 04/17/2020 - 10:29am
service function chains
Resiliency
resource allocation
resource allocation problem
resource management
security
security aspects
security of data
security requirements
security-aware service request design
resilience
software images
specialized hardware appliances
Substrates
supported service
Switches
virtualisation
Virtualization
virtualization privacy
load-balancers
best practices
Cloud Computing
cloud-based applications
composability
Hardware
high-volume servers
Human behavior
Human Factors
initial SFC requests
Bandwidth
Metrics
network function virtualization
network functions
network service request
NFV environment
NFV-enabled networks
privacy
pubcrawl
biblio
Cloud Based Intrusion Detection and Prevention System for Industrial Control Systems Using Software Defined Networking
Submitted by grigby1 on Fri, 04/17/2020 - 10:29am
production engineering computing
microgrid energy management system
network function virtualization
network intrusion services
network security tools
OpenDaylight software
packet inspection
power engineering computing
power grids
power system control
privacy
microgrid
pubcrawl
resilience
Resiliency
SDN controller
service function chaining
software defined networking
virtual private cloud
virtualisation
virtualization privacy
web services
Human Factors
CB-IDPS
cloud Based intrusion detection and prevention system
Cloud Computing
composability
computer network security
control engineering computing
cyber security
data privacy
energy management systems
Human behavior
Amazon Web Services
ICs
Anomaly Detection
ICS delay constraints
ICS networks
industrial control
Industrial Control Systems
intrusion detection and prevention
layer encryption
manufacturing systems
Metrics
biblio
An SDN/NFV-Enabled Architecture for Detecting Personally Identifiable Information Leaks on Network Traffic
Submitted by grigby1 on Fri, 04/17/2020 - 10:24am
SDN/NFV-enabled architecture
NFV-enabled system
personally identifiable information detector
personally identifiable information leaks detection
privacy
privacy leaks
pubcrawl
resilience
Resiliency
SDN controllers
NFV MANO
Servers
social networking
software defined networking
software defined networking paradigm
software-based solutions
traffic intensity
unintended data disclosure
virtualisation
virtualization privacy
Human Factors
composability
computer architecture
computer network security
Data Breach
data breaches
data privacy
data-intensive nature
hardware-specific implementation
Human behavior
Cloud Computing
internet
leak detection
leak detection systems
load balancer
Measurement
Metrics
Middleboxes
network function virtualization
network traffic
biblio
Undertow: An Intra-Kernel Isolation Mechanism for Hardware-Assisted Virtual Machines
Submitted by grigby1 on Fri, 04/17/2020 - 10:24am
isolation
bug-prone
commodity operating system
critical data
EPT violations
flexible cloud servers
guest kernel
guest virtual machine
Hardware virtualization
hardware-assisted isolation mechanism
hardware-assisted virtual machines
Intel processors
intra-kernel isolation mechanism
isolated environment
boot time
Kernel Protection
multiple restricted Extended Page Table
nested kernel
popular paths
pre-defined EPT
read-only protection
system calls
unpopular paths
untrusted code
untrusted outter kernel
virtualization exception
VMFUNC
virtualization privacy
composability
Cloud Computing
security
Trusted Computing
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data privacy
sensitive data
privacy
storage management
security threats
authorisation
invasive software
Linux
Switches
virtualisation
Virtual machining
Kernel
operating system kernels
Virtual machine monitors
virtual machines
Virtualization
Metrics
security policies
bare-metal machines
biblio
Side Channel Attacks in Computation Offloading Systems with GPU Virtualization
Submitted by grigby1 on Fri, 04/17/2020 - 10:23am
Runtime
Metrics
mobile computing
mobile systems
operating system
privacy
pubcrawl
resilience
Resiliency
Libraries
side channel attack
side channel attacks
side-channel attacks
virtual machine
virtual machines
virtualisation
Virtualization
virtualization privacy
graphics processing units
Cloud Computing
composability
computation offloading systems
computation performance
Cryptography
GPU systems
GPU vendors
GPU virtualization
cloud
high-performance GPUs
Human behavior
Human Factors
intensive computation
Internet of Things
IoT
Kernel
learning (artificial intelligence)
biblio
ATMOSPHERE: Adaptive, Trustworthy, Manageable, Orchestrated, Secure, Privacy-Assuring, Hybrid Ecosystem for Resilient Cloud Computing
Submitted by aekwall on Mon, 04/13/2020 - 10:21am
cyber physical systems
Trustworthy Systems
trustworthy cloud-enabled applications
resilient cloud computing
research and development
project management
privacy-assuring ecosystem
multiinstitutional research and development
distributed cloud computing providers
ATMOSPHERE project
adaptive ecosystem
security
Virtualization
composability
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
Trusted Computing
data privacy
virtualisation
Cloud Computing
biblio
Implementation of Platform Controller and Process Modules of the Edge Computing for IoT Platform
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
edge computing
Human Factors
Pervasive Computing Security
wide area network
process modules
process control
platform controller
IoT platform
edge nodes
distributed processing
data-processing flows
container-based virtualization technology
container technology
encryption
Containers
IoT
Human behavior
resilience
Resiliency
Metrics
pubcrawl
Virtualization
virtualisation
Scalability
computer network security
Internet of Things
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »