Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Virtual machine monitors
biblio
SEVerity: Code Injection Attacks against Encrypted Virtual Machines
Submitted by grigby1 on Thu, 05/12/2022 - 10:50am
outsourcing
Virtualization
Virtual machining
virtual machine security
Virtual machine monitors
Resiliency
resilience
Registers
pubcrawl
privacy
virtualization privacy
Memory management
Encrypted Virtual Machines
cyber physical systems
Cryptography
composability
Code Execution Attacks
Cloud Computing
AMD SEV ES
AMD SEV
biblio
A Secure and Formally Verified Linux KVM Hypervisor
Submitted by grigby1 on Thu, 05/12/2022 - 10:50am
virtualization privacy
composability
Cryptography
cyber physical systems
Hardware
information management
Linux
privacy
pubcrawl
resilience
Resiliency
security
Virtual machine monitors
virtual machine security
Virtual machining
biblio
DNS Records Secure Provisioning Mechanism for Virtual Machines automatic management in high density data centers
Submitted by grigby1 on Thu, 05/12/2022 - 10:48am
network operations
Web and internet services
Virtual machining
virtual machine security
Virtual machine monitors
virtual machine
TCPIP
service-oriented architecture
Resiliency
resilience
pubcrawl
Named Data Network Security
network interface
IP networks
IP address
domain name system
DNS records
cyber physical systems
Cryptography
composability
Cloud Computing
biblio
Cyber Resilience for Self-Monitoring IoT Devices
Submitted by grigby1 on Tue, 03/22/2022 - 1:45pm
Attack detection
System recovery
Trusted services
Self-monitoring
Device recovery
cyber resilience
Production facilities
Proposals
Virtual machine monitors
computer architecture
NIST
Hardware
Resiliency
resilience
pubcrawl
security
Internet of Things
biblio
A framework for automated dynamic malware analysis for Linux
Submitted by aekwall on Tue, 09/21/2021 - 11:09am
Hardware
tools
Virtual machine monitors
Virtual machining
Linux
Virtualization
pubcrawl
Resiliency
Human behavior
privacy
malware
dynamic analysis
Malware Analysis
computer security
sandbox
Predictive Metrics
biblio
Virtual Machine Monitor-based Hiding Method for Access to Debug Registers
Submitted by grigby1 on Thu, 07/08/2021 - 2:27pm
Virtual machining
virtual machine security
virtual machine monitor
debug register
virtual machine
Cyber Physical System
Writing
system security
operating systems
Virtual machine monitors
Cryptography
Registers
composability
Hardware
Resiliency
resilience
pubcrawl
Monitoring
security
biblio
Solving the Interdependency Problem: A Secure Virtual Machine Allocation Method Relying on the Attacker’s Efficiency and Coverage
Submitted by grigby1 on Thu, 07/08/2021 - 2:24pm
Virtual machining
virtual machine security
interdependency problem
hypervisor
Cyber Physical System
Investment
virtual machine
resource management
Virtual machine monitors
Cryptography
composability
Resiliency
resilience
pubcrawl
Servers
security
Cloud Computing
biblio
TCB Minimization towards Secured and Lightweight IoT End Device Architecture using Virtualization at Fog Node
Submitted by aekwall on Wed, 07/07/2021 - 5:09pm
secured architecture
composability
virtualization privacy
Human behavior
Resiliency
Metrics
pubcrawl
Virtual machine monitors
trusted computing base
TCB Minimization
security
Metals
Lightweight Architecture
IoT End Device
Internet of Things
computer architecture
privacy
Software
Minimization
biblio
How to Control a TCP: Minimally-Invasive Congestion Management for Datacenters
Submitted by grigby1 on Wed, 12/02/2020 - 2:01pm
reduced interflow competition
virtual machines
Virtual machine monitors
unequal share
transport protocols
telecommunication traffic
telecommunication congestion control
TCP sending rate
TCP receiver window
TCP connections
TCP congestion control
Switches
Scalability
Resiliency
resilience
Registers
bottleneck capacity
Receivers
pubcrawl
Proposals
operating systems (computers)
multitenant datacenters
minimally-invasive congestion management
Internet-wide benefits
internet
hypervisor control traffic
Hardware
guest OS
datacenter
Couplings
coupled congestion control
computer centres
biblio
Analyzing Overhead from Security and Administrative Functions in Virtual Environment
Submitted by grigby1 on Tue, 11/17/2020 - 2:41pm
para-virtualization technique
virtual environment
virtual environments
administrative component performance recommendations
Availability
guest operating systems
guest VMs
hypervisor workload
overhead analysis
operating systems
Redundancy
response time
System Availability
virtual platforms
virtualized environment
Xen-hypervisor
Operating systems security
Virtual machining
security
Servers
pubcrawl
Metrics
Resiliency
composability
system monitoring
virtualisation
security of data
Virtual machine monitors
virtual machines
load balancing
resource allocation
Bandwidth
resilience
operating systems (computers)
« first
‹ previous
1
2
3
4
5
6
next ›
last »