Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hypervisor
biblio
Latency Analysis of I/O Virtualization Techniques in Hypervisor-Based Real-Time Systems
Submitted by grigby1 on Thu, 09/29/2022 - 3:43pm
security
pubcrawl
Hardware
Safety
Scalability
delays
real-time systems
real time systems
Virtualization
Virtual machine monitors
Measurement
i-o systems security
hypervisor
I/O virtualization
latency analysis
response time analysis
biblio
A Survey on Hypervisor-based Virtualization of Embedded Reconfigurable Systems
Submitted by aekwall on Fri, 08/26/2022 - 11:23am
embedded systems
Hardware
Reliability
real-time systems
Virtual machine monitors
virtual machine
pubcrawl
Metrics
Resiliency
composability
Safety
Market research
embedded
FPGA Virtualization
hypervisor
real-time
biblio
Bare-metal hypervisor virtual servers with a custom-built automatic scheduling system for educational use
Submitted by grigby1 on Tue, 05/24/2022 - 12:51pm
Metrics
virtual server
software programming
computer science
Costs
hypervisor
Focusing
Processor scheduling
ethics
virtual laboratory
Compositionality
Schedules
Virtual machine monitors
Virtualization
composability
Information Assurance
Resiliency
resilience
Human behavior
pubcrawl
Training
biblio
Solving the Interdependency Problem: A Secure Virtual Machine Allocation Method Relying on the Attacker’s Efficiency and Coverage
Submitted by grigby1 on Thu, 07/08/2021 - 1:24pm
Virtual machining
virtual machine security
interdependency problem
hypervisor
Cyber Physical System
Investment
virtual machine
resource management
Virtual machine monitors
Cryptography
composability
Resiliency
resilience
pubcrawl
Servers
security
Cloud Computing
biblio
Securing Virtual Machines on Cloud through Game Theory Approach
Submitted by grigby1 on Mon, 03/09/2020 - 12:25pm
resource allocation
VMVM
virtualisation
Virtual machining
virtual machines
virtual machine vitality measure
virtual machine security
Virtual machine monitors
virtual environments
virtual environment
utility function
tower defence game
security
Cloud Computing
pubcrawl
Poles and towers
operating systems (computers)
hypervisor
Hardware
Games
game theory approach
game theory
game strategy block
computer games
cloud server failure
biblio
Distributed Denial of Service Attack Prevention at Source Machines
Submitted by grigby1 on Wed, 12/18/2019 - 1:45pm
source machines
operating system
packet transmission suppression
particle filtering (numerical methods)
pubcrawl
Reliability
reliable DDoS attack prevention scheme
resilience
Resiliency
security
Servers
Metrics
thin hypervisor
throughput overhead
transparent DDoS attack prevention scheme
user experience avoidance
Virtual machine monitors
virtual machines
virtualisation
Virtualization
virtualization overhead reduction
distributed denial of service attack prevention
attack packets
Berkeley packet filter
BitVisor
composability
Computer crime
computer network security
configurable packet filtering mechanism
DDoS Attack
DDoS Attack Prevention
arbitrary packet transmissions
filtering policy
flexible DDoS attack prevention scheme
guaranteed safe code execution mechanism
Hardware
hijacked machines
Human behavior
hypervisor
internet
lightweight DDoS attack prevention scheme
biblio
Hardening Hypervisors Against Vulnerabilities in Instruction Emulators
Submitted by grigby1 on Mon, 01/21/2019 - 11:18am
composability
Human behavior
hypervisor
Instruction Emulator
Metrics
privacy
pubcrawl
Resiliency
security
Virtualization
virtualization privacy
biblio
Trustworthy Services Built on Event-Based Probing for Layered Defense
Submitted by grigby1 on Fri, 02/02/2018 - 12:29pm
Memory management
watchdogs
VMI
Virtual machine monitors
virtual appliance
Trustworthy Systems
trustworthy services
trustworthy logging
Trusted Computing
system monitoring
system hangs
Resiliency
Registers
pubcrawl
Probes
Monitoring
Attack detection
layered defense
Intrusion Detection
IDS
hypervisor
Hardware
guest-system-call events
feature extraction
event-based probing
defense-in-depth
cyber physical systems
composability
cloud-tuned intrusion detection system
cloud computing environments
Cloud Computing
biblio
Secure Tera-scale Data Crunching with a Small TCB
Submitted by grigby1 on Tue, 01/16/2018 - 5:22pm
Outsourced Database Integrity
virtual storage
virtual memory
trusted hardware
trusted computing base
Trusted Computing
tera-scale data crunching
self-contained services
security of data
secure virtual memory
secure execution
Resiliency
pubcrawl
Cloud Computing
Metrics
Memory management
Libraries
LASTGT system
large-scale data
large state on a generic trusted component
Intel SGX
hypervisor
Hardware
data handling
Cryptography
composability
biblio
Xen Network Flow Analysis for Intrusion Detection
Submitted by grigby1 on Mon, 03/20/2017 - 9:47am
composability
hypervisor
pubcrawl
Underwater Networks
XEN
1
2
next ›
last »