Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Virtual machine monitors
biblio
Securing Virtual Machines on Cloud through Game Theory Approach
Submitted by grigby1 on Mon, 03/09/2020 - 1:25pm
resource allocation
VMVM
virtualisation
Virtual machining
virtual machines
virtual machine vitality measure
virtual machine security
Virtual machine monitors
virtual environments
virtual environment
utility function
tower defence game
security
Cloud Computing
pubcrawl
Poles and towers
operating systems (computers)
hypervisor
Hardware
Games
game theory approach
game theory
game strategy block
computer games
cloud server failure
biblio
To Detect Malware attacks for an Autonomic Self-Heal Approach of Virtual Machines in Cloud Computing
Submitted by grigby1 on Mon, 03/09/2020 - 1:25pm
public cloud services
Virtual machining
virtual machines memory snapshots API call sequences
virtual machines
virtual machine snapshots
virtual machine security
Virtual machine monitors
unsupervised machine
unattacked virtual machine memory snapshots
supervised machine learning techniques
self-heal approach
self-heal algorithm
Self-Heal
security features
security
API calls
pubcrawl
private cloud environment
private cloud
operating systems
Monitoring
malware attacks
malware
machine learning algorithms
learning (artificial intelligence)
invasive software
Cloud Computing
attack model
application program interfaces
biblio
White Visor: Support of White-Box Switch in SDN-Based Network Hypervisor
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
Routing
white-box switch
white visor
white box cryptography
Virtualization
virtualisation
virtual network
virtual machines
Virtual machine monitors
Switches
software-defined networking
software defined networking
composability
Resiliency
resilience
pubcrawl
Pipelines
networking fabrics
network virtualization
network topology
network management
network hypervisor
Metrics
computer network management
biblio
Distributed Denial of Service Attack Prevention at Source Machines
Submitted by grigby1 on Wed, 12/18/2019 - 2:45pm
source machines
operating system
packet transmission suppression
particle filtering (numerical methods)
pubcrawl
Reliability
reliable DDoS attack prevention scheme
resilience
Resiliency
security
Servers
Metrics
thin hypervisor
throughput overhead
transparent DDoS attack prevention scheme
user experience avoidance
Virtual machine monitors
virtual machines
virtualisation
Virtualization
virtualization overhead reduction
distributed denial of service attack prevention
attack packets
Berkeley packet filter
BitVisor
composability
Computer crime
computer network security
configurable packet filtering mechanism
DDoS Attack
DDoS Attack Prevention
arbitrary packet transmissions
filtering policy
flexible DDoS attack prevention scheme
guaranteed safe code execution mechanism
Hardware
hijacked machines
Human behavior
hypervisor
internet
lightweight DDoS attack prevention scheme
biblio
Enhanced Secure Mechanism for Virtual Machine Migration in Clouds
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
source nonrepudiation
Metrics
mutual authentication
pubcrawl
replay protection
Repudiation
resilience
Resiliency
Software as a service
malicious viruses
unauthorized access
Virtualization
virtual machine migration
Virtual machine monitors
virtual machines
VM disk images
vulnerabilities
authentication
live VM migration
live migration
Human behavior
enhanced secure mechanism
DDoS Attacks
data integrity
data confidentiality
computer viruses
Computational modeling
composability
Cloud federations
Cloud Computing
AVISPA tool
authorization
authorisation
biblio
VM processes state detection by hypervisor tracing
Submitted by grigby1 on Mon, 01/21/2019 - 12:18pm
virtualisation
security
Trace Compass
virtual machine
Virtual machine monitors
virtual machines
Virtual machining
Virtual Process
virtual Process State Detection algorithm
Resiliency
Virtualization
virtualization privacy
VM processes state detection
VM trace analysis algorithm
vPSD
Wait Analysis
wait state
Instruction sets
Cloud Computing
cloud environments
composability
Data collection
host hypervisor
host kernel tracing
Human behavior
hypervisor tracing
cloud
interactive trace viewer
Metrics
Monitoring
Performance analysis
physical host level
privacy
pubcrawl
biblio
A Cross-Virtual Machine Network Channel Attack via Mirroring and TAP Impersonation
Submitted by grigby1 on Mon, 01/21/2019 - 12:17pm
side channel attacks
network channel attacks
network traffic
openstack
physical machine
privacy
pubcrawl
Resiliency
security
security requirements
Network Channel Attack
Switches
TAP impersonation
Virtual machine monitors
virtual machines
virtualisation
virtualization privacy
virtualization services
VM-to-VM interference
internal cloud virtual network
Cloud Computing
cloud platform
co-located VMs
co-resident VMs
composability
computer network security
cross-Virtual machine network channel attack
data privacy
Human behavior
Bridges
internal virtual network
IP networks
logical resource isolation
malicious VM
Metrics
mirroring
Monitoring
multitenant virtualized cloud environments
biblio
H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices
Submitted by grigby1 on Mon, 01/21/2019 - 12:17pm
security
memory data protection strategies
Metrics
microprocessor chips
operating system kernels
privacy
private data
pubcrawl
Resiliency
low power consumption
smart phones
types H-Securebox
Virtual machine monitors
virtual machines
virtualisation
Virtualization
virtualization privacy
ARM hardware virtualization technique
kernel-level memory data
kernel privilege
kernel level attack
Kernel
IoT devices
Internet of Things
hypervisor privilege
Human behavior
Hardware
hardened memory data protection framework
H-Securebox system
embedded systems
data privacy
composability
ARM Hypervisor
biblio
Windows Virtualization Architecture For Cyber Threats Detection
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
Virtual machine monitors
prediction tool
prediction tools development
pubcrawl
Real-time monitoring
Resiliency
Rootkits
static methods
system monitoring
target Windows machines
virtual machine introspection
Microsoft Windows (operating systems)
virtual machines
virtual memory introspection
Virtualization
VMI
Windows operating system
Windows Operating System Security
Windows OS
Windows threat detection
Windows virtualization architecture
Xen hypervisor
machine learning
composability
cyber breaches
cyber threats detection
Cybersecurity
data structures
hidden security issues
invasive software
Kernel
kernel data structures
learning (artificial intelligence)
alert system administrators
machine learning techniques
malicious process behavior
malware
malware detection
malware threats
memory data structure identification
memory forensic analysis
Metrics
microsoft windows
biblio
A Survey on Security of Cloud Environment: Threats, Solutions, and Innovation
Submitted by grigby1 on Wed, 11/14/2018 - 1:15pm
malicious behavior detection
VMI
Virtual machining
virtual machines
Virtual machine monitors
virtual machine monitor
virtual machine introspection techniques
tenant network
security of data
security
Resiliency
resilience
pubcrawl
Monitoring
misuse detection techniques
malware
attack taxonomy
machine learning
intrusion detection techniques
expandability
data mining techniques
Data mining
Compositionality
CloudVMI
CloudI
Cloud Security
cloud introspection
cloud computing environment
Cloud Computing
block chain technology
behavior analysis
« first
‹ previous
1
2
3
4
5
6
next ›
last »