Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
virtualisation
biblio
Scalable Honeypot Architecture for Identifying Malicious Network Activities
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
IP networks
virtualized environment
virtualisation
Servers
server machines
server honeypots
scalable honeypot architecture
pubcrawl170114
Ports (Computers)
peripheral security measures
operating systems
malware
malicious network activities identification
Kippo
J-Honeypot
advanced persistent attacks
honeypots
HoneyD
hacker activities
government organisations
Glastopf
file servers
Distributed honeypots
Dionaea
computer network security
Computer hacking
Computer crime
computer architecture
attack packets
biblio
Security function virtualization in software defined infrastructure
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
SAVI SDI testbed
Whales
VNF
virtualized network function
virtualisation
software defined networking
software defined infrastructure
Software
Servers
security solution
security function virtualization
security attack
security
Bandwidth
pubcrawl170114
OPEX
network intrusion detection and prevention
IP networks
Inspection
honey-pot
DPI system
deep packet inspection system
computer network security
capital and operational expense
CAPEX
biblio
Teaching and Training Cybersecurity as a Cloud Service
Submitted by grigby1 on Tue, 03/07/2017 - 12:41pm
GenCyber camps
virtualization technologies
Virtualization
virtualisation
virtual cybersecurity experiments
virtual cloud services
Servers
security of data
pubcrawl170109
Protocols
Network interfaces
IT infrastructures
IoT
Internet of Things
Internet connectivity
graduate students
and cloud computing
educational courses
education
cybersecurity training
cybersecurity teaching
cybersecurity lab as a service
cybersecurity experiments
cyber resources
computer science education
Computer crime
computer aided instruction
cloud service
cloud computing systems
Cloud Computing
CLaaS
biblio
Efficient spear-phishing threat detection using hypervisor monitor
Submitted by grigby1 on Tue, 03/07/2017 - 12:39pm
spear-phishing attack
malicious activities
malicious attachments
malware
Monitoring
PDF format structures
Portable document format
pubcrawl170109
Spear-phishing
invasive software
spear-phishing threat detection
transparent hypervisor monitor
unsolicited e-mail
URL links
user accounts
Virtual machine monitors
virtualisation
Virtualization
document handling
CIA
Cloud Computing
cloud-threat inspection appliance
commercial antivirus software
Computer crime
cyber security
cyber security threats
detection engine
antievasion sandbox
document prefiltering algorithm
Electronic mail
fake emails
hackers
hardware-assisted virtualization
hardware-assisted virtualization technology
hypervisor kernel
hypervisor monitor
biblio
CLaaS: Cybersecurity Lab as a Service – Design, Analysis, and Evaluation
Submitted by grigby1 on Tue, 03/07/2017 - 12:36pm
CLaaS
Cloud Computing
cloud computing system
Computer crime
Cybersecurity
cybersecurity lab as a service
education
IP networks
pubcrawl170109
security of data
Servers
virtual cybersecurity
virtual lab
virtualisation
Virtualization
virtualization technology
biblio
"Execution Time Measurement of Virtual Machine Volatile Artifacts Analyzers"
Submitted by abfox on Tue, 02/14/2017 - 12:33pm
public domain software
virtualization environment
virtualisation
Virtual machining
virtual machines
virtual machine volatile artifact analyzers
Virtual machine monitors
virtual machine introspection
virtual infrastructure privileged access
storage management
spyware
Semantics
semantic gap
rootkit
Random access memory
advanced persistent threat
pubcrawl170101
memory forensic analysis tool
memory forensic analysis
malware
live virtual machine RAM dump
LibVMI open source tool
Kernel
invasive software
intrusion detection system
hypervisor
execution time measurement
Digital Forensics
captured memory dump analysis
advanced persistent threats
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 1:11pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
Datacenter Applications in Virtualized Networks: A Cross-Layer Performance Study
Submitted by BrandonB on Tue, 05/05/2015 - 9:23am
network virtualization
virtualized networks
Virtualization
virtualisation
software-defined networking
software radio
software defined networking overlays
Servers
Protocols
overlay networks
overlay network
Cloud Computing
IP networks
Hardware
Encapsulation
delays
datacenter workloads
datacenter networks
datacenter applications
cross layer performance study
cross layer hybrid mesoscale simulation platform
computer centres
biblio
Security attack mitigation framework for the cloud
Submitted by BrandonB on Tue, 05/05/2015 - 9:17am
security guarantee
Markov processes
mean time to security failure
MTTSF cloud
privacy losses
private data security
resource consolidation
security
Security Administration
security attack mitigation framework
Markov model
security of data
Silicon
software products
software vulnerabilities
software vulnerability exploits
virtual machine
Virtual machining
virtualisation
virtualization technology
customer trust
attack mitigation plan
availability parameter
business data leaks
Cloud Computing
cloud resource manager
cloud service
Companies
confidentiality parameter
cross-channel attacks
attack graphs
enterprise cloud computing
enterprise cloud solutions
enterprise IT infrastructure
enterprise wide information processing system
hacking techniques
information technology
integrity parameter
markov chain
biblio
The price of virtualization: Performance isolation in multi-tenants networks
Submitted by BrandonB on Tue, 05/05/2015 - 8:51am
online link utilization feedback mechanism
Virtualization
virtualisation
Substrates
Servers
resource management
resource allocation network
Ports (Computers)
OpenFlow protocol
address space isolation
network virtualization
multitenants datacenter network
Labeling
Internet evolutionary path
internet
flow space isolation
Bandwidth
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »