Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Virtual machine monitors
biblio
Efficient spear-phishing threat detection using hypervisor monitor
Submitted by grigby1 on Tue, 03/07/2017 - 1:39pm
spear-phishing attack
malicious activities
malicious attachments
malware
Monitoring
PDF format structures
Portable document format
pubcrawl170109
Spear-phishing
invasive software
spear-phishing threat detection
transparent hypervisor monitor
unsolicited e-mail
URL links
user accounts
Virtual machine monitors
virtualisation
Virtualization
document handling
CIA
Cloud Computing
cloud-threat inspection appliance
commercial antivirus software
Computer crime
cyber security
cyber security threats
detection engine
antievasion sandbox
document prefiltering algorithm
Electronic mail
fake emails
hackers
hardware-assisted virtualization
hardware-assisted virtualization technology
hypervisor kernel
hypervisor monitor
biblio
"Execution Time Measurement of Virtual Machine Volatile Artifacts Analyzers"
Submitted by abfox on Tue, 02/14/2017 - 1:33pm
public domain software
virtualization environment
virtualisation
Virtual machining
virtual machines
virtual machine volatile artifact analyzers
Virtual machine monitors
virtual machine introspection
virtual infrastructure privileged access
storage management
spyware
Semantics
semantic gap
rootkit
Random access memory
advanced persistent threat
pubcrawl170101
memory forensic analysis tool
memory forensic analysis
malware
live virtual machine RAM dump
LibVMI open source tool
Kernel
invasive software
intrusion detection system
hypervisor
execution time measurement
Digital Forensics
captured memory dump analysis
advanced persistent threats
biblio
Enhancing security of Hadoop in a public cloud
Submitted by drwright on Wed, 05/04/2016 - 9:07am
internal cloud attacks
Vulnerability and Resilience Prediction Models
Virtual machine monitors
SEHadoop
security enhancement
security
resilience
public cloud
parallel processing
overloaded authentication key
least access privilege
lack of fine-grained access control
Access Control
Hadoop security mechanism
fine-grained access control
Data processing
data access
Containers
compromise resilience
Cloud Computing
authorisation
authentication key
authentication
biblio
Dynamic VM Dependability Monitoring Using Hypervisor Probes
Submitted by amyclay on Mon, 11/16/2015 - 6:12pm
Science of Security
computer security
fault diagnosis
NSA SoS Lablets Materials
Platform virtualization
Reliability
Science of Security
UIUC
Virtual machine monitors
UIUC
NSA SoS Lablets Materials
Data Driven Security Models and Analysis
file
Dynamic VM Dependability Monitoring Using Hypervisor Probes
Submitted by amyclay on Mon, 11/16/2015 - 6:12pm
Science of Security
computer security
fault diagnosis
Platform virtualization
Reliability
UIUC
Virtual machine monitors
NSA SoS Lablets Materials
Science of Security
UIUC
NSA SoS Lablets Materials
Data Driven Security Models and Analysis
biblio
A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks
Submitted by BrandonB on Tue, 05/05/2015 - 10:29am
ordered hierarchy
Virtual machine monitors
user-level applications
System software
supervisory programs
storage management
security of data
processor architecture
privileged system software
privilege level
permission mechanism
Permission
performance overhead
arbitrary malicious activities
operating systems
noninclusive memory permissions architecture
modern computer system protection
modern commodity systems
Memory management
hypervisor code
high-privileged software layer
hardware-supported page permission scheme
hardware complexity
Hardware
cross-layer attack protection
complex software stack protection
biblio
Counteracting security attacks in virtual machines in the cloud using property based attestation
Submitted by BrandonB on Fri, 05/01/2015 - 9:15am
cloud
malware
Rootkits
TPM attestation
Trusted Computing
Virtual machine monitors
Zero day attacks
biblio
Analysis of Monolithic and Microkernel Architectures: Towards Secure Hypervisor Design
Submitted by BrandonB on Thu, 04/30/2015 - 2:09pm
microkernel architectures
XEN
virtualization platform
virtualisation
Virtual machining
Virtual machine monitors
security tradeoffs
security of data
security
secure hyper visor design
networking
monolithic hyper visor architectures
monolithic architectures
monolithic architecture
monitoring interface
Monitoring
application program interfaces
microkernel architecture
micro kernel hyper visor architectures
micro architecture
management API
Kernel
hypervisor security
Hyper-V
hyper visor security
hyper calls
Hardware
ESXi
computer architecture
Cloud Computing
attack surface
biblio
Secure Live Virtual Machines Migration: Issues and Solutions
Submitted by BrandonB on Thu, 04/30/2015 - 2:02pm
Servers
X.805 security standard
workload balancing
VMM
Virtualization
Virtual machining
virtual machines
Virtual machine monitors
virtual machine monitor
authentication
security of data
online system maintenance
live virtual machine migration
Internet server
Hardware
fault tolerance
cloud-based service
Cloud Computing
biblio
Hypervisor-based cloud intrusion detection system
Submitted by BrandonB on Thu, 04/30/2015 - 1:25pm
multitenancy
virtualization technology
Virtualization
virtualisation
Virtual machining
virtual machines
virtual machine performance metrics
Virtual machine monitors
software metrics
Software Architecture
shared resource utilization
received packets
packet transmission
operating system
block device read requests
Measurement
intrusion detection security
Intrusion Detection
hypervisor-based cloud intrusion detection system
hypervisor performance metrics
hypervisor
CPU utilization
computer network security
Computer crime
cloud features
cloud computing resources
Cloud Computing
block device write requests
« first
‹ previous
1
2
3
4
5
6