Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Virtual machine monitors
biblio
VM live migration time reduction using NAS based algorithm during VM live migration
Submitted by grigby1 on Wed, 07/18/2018 - 10:14am
unnecessary duplicated data transfer
Signal processing algorithms
SLA
storage data
storage management
Stress
system files
system maintenance
telecommunication traffic
Service Level Agreement
Virtual machine monitors
virtual machines
Virtual machining
virtualisation
Virtualization
virtualization environment
VM live migration time reduction
zero downtime
live virtual machine migration
computer centres
datacenters
file servers
hash map-based algorithm
I-O operations
I-O Systems
i-o systems security
live migration
Cloud Computing
NAS
NAS-based algorithm
network traffic
pubcrawl
Random access memory
random-access storage
Scalability
Servers
biblio
On the Effectiveness of Virtualization Based Memory Isolation on Multicore Platforms
Submitted by grigby1 on Wed, 02/21/2018 - 1:37pm
page table maintenance
XMHF
virtualization based memory isolation
virtualisation
Virtual machine monitors
thread identification
storage management
software maintenance
security primitive
security of data
security
Scalability
Resiliency
resilience
pubcrawl
address mapping validation
multiprocessing systems
multicore setting
Multicore processing
multicore platforms
multicore computing security
Multicore Computing
Metrics
memory isolation security
Kernel
Instruction sets
Hardware
fully isolated microcomputing environment
FIMCE
BitVisor
biblio
Trustworthy Services Built on Event-Based Probing for Layered Defense
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
Memory management
watchdogs
VMI
Virtual machine monitors
virtual appliance
Trustworthy Systems
trustworthy services
trustworthy logging
Trusted Computing
system monitoring
system hangs
Resiliency
Registers
pubcrawl
Probes
Monitoring
Attack detection
layered defense
Intrusion Detection
IDS
hypervisor
Hardware
guest-system-call events
feature extraction
event-based probing
defense-in-depth
cyber physical systems
composability
cloud-tuned intrusion detection system
cloud computing environments
Cloud Computing
biblio
Policy-Customized: A New Abstraction for Building Security as a Service
Submitted by grigby1 on Tue, 01/16/2018 - 6:34pm
Resiliency
Virtual machining
Virtual machine monitors
Trusted Cloud Service
Servers
security policies
Security on Demand
security
Scalability
Cloud Computing
Remote Attestation
pubcrawl
Protocols
Policy-Customized
Pervasive Computing Security
Metrics
Human Factors
computer architecture
biblio
Machine Learning Based DDoS Attack Detection from Source Side in Cloud
Submitted by grigby1 on Tue, 01/16/2018 - 6:24pm
machine learning based DDoS attack detection
Virtual machining
virtual machines
Virtual machine monitors
virtual machine monitor
telecommunication computing
statistical information
statistical analysis
Servers
Resiliency
pubcrawl
network traffic
network security
network packages
Metrics
Cloud Computing
machine learning algorithms
machine learning
learning (artificial intelligence)
Human behavior
feature extraction
Denial of Service attacks
DDoS attack detection
DDoS Attack
computer network security
Computer crime
composability
cloud server hypervisor
cloud provider
biblio
Towards comprehensive protection for OpenFlow controllers
Submitted by grigby1 on Wed, 01/10/2018 - 12:24pm
Cross Layer Security
Virtual machine monitors
telecommunication control
security
Resiliency
pubcrawl
operating systems
OpenFlow critical component
OpenFlow controller
malicious controller
Industrial Control Systems
dynamic networks
adaptive networks
cross layer diversity
control systems
control plane-data ploane decoupling
control logic
computer network security
Computer bugs
computer architecture
composability
Attack vectors
agile networks
biblio
An Experimental Evaluation of a Cloud-Based Virtual Computer Laboratory Using Openstack
Submitted by grigby1 on Thu, 12/28/2017 - 1:36pm
Policy-Governed Secure Collaboration
Virtualization
Virtual machining
Virtual machine monitors
Virtual Computer Lab
Servers
Science of Security
Scalability
Resiliency
pubcrawl
Cloud Computing
openstack
Metrics
Human Factors
Human behavior
Experimental Evaluation
computer architecture
Computational modeling
composability
collaboration
biblio
Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
Intrusion Detection
Virtualization
Virtual machining
Virtual machine monitors
security of data
Resiliency
quality of service
QoS
pubcrawl
monitoring techniques
Monitoring
intrusion tolerance
intrusion prevention mechanisms
attack tolerance
internet
H2020 CLARUS project
data confidentiality
data availability
composability
cloud-specific attacks
cloud vulnerabilities
cloud environments
Cloud Computing
cloud
CLARUS approach
attack-tolerance
biblio
Assessment of Hypervisor Vulnerabilities
Submitted by grigby1 on Mon, 11/20/2017 - 12:22pm
testing
policy-based governance
Ports (Computers)
pubcrawl
Resiliency
security
security of data
Security weakness
security weaknesses
Software
Policy
virtual machine management
Virtual machine monitors
virtual machines
Virtual machining
virtualisation
Virtualization
VMware ESXi
Vulnerability Analysis and Assessment
Governance
Cloud Computing
cloud computing systems
collaboration
CVE
CVSS
CVSS information
CWE
ESXi Web interface
Citrix XenServer
Government
HTTP response splitting
Human behavior
hypervisor security
hypervisor vulnerability assessment
KVM
Metrics
NIST 800-115 security testing framework
biblio
Hypervisor-Based Attestation of Virtual Environments
Submitted by grigby1 on Thu, 04/20/2017 - 12:29pm
Resiliency
Virtual machining
virtual machines
Virtual machine monitors
Virtualization
virtualisation
virtual environments
Trusted Computing
TPM device
Software
scalable remote attestation scheme
attestation
pubcrawl
private cloud
NFV
network function virtualization
Metrics
hypervisor-based attestation
Hardware
data privacy
computer architecture
Cloud Computing
« first
‹ previous
1
2
3
4
5
6
next ›
last »