Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
VMI
biblio
Openstack: Launch a Secure User Virtual Machine Image into a Trust Public Cloud IaaS Environment
Submitted by grigby1 on Mon, 03/09/2020 - 1:27pm
tpm
policy-based governance
pubcrawl
Resiliency
Scalability
secure launch user VMI
secure user virtual machine image
security
security policy
Software
openstack
trust cloud environment
trust public cloud IaaS environment
Trusted Computing
user VMI requirements
virtual machine security
virtual machines
Virtual machining
VMI
Cryptography
cloud computing architecture
Cloud Management Platforms
cloud-delivered model
CMP
Computational modeling
computer architecture
confidentiality
cryptographic techniques
Cloud Computing
cryptology
enhanced TPM remote attestation
Human behavior
IaaS
IaaS classical processes
infrastructure-as-a-service
Launch
Metrics
biblio
Windows Virtualization Architecture For Cyber Threats Detection
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
Virtual machine monitors
prediction tool
prediction tools development
pubcrawl
Real-time monitoring
Resiliency
Rootkits
static methods
system monitoring
target Windows machines
virtual machine introspection
Microsoft Windows (operating systems)
virtual machines
virtual memory introspection
Virtualization
VMI
Windows operating system
Windows Operating System Security
Windows OS
Windows threat detection
Windows virtualization architecture
Xen hypervisor
machine learning
composability
cyber breaches
cyber threats detection
Cybersecurity
data structures
hidden security issues
invasive software
Kernel
kernel data structures
learning (artificial intelligence)
alert system administrators
machine learning techniques
malicious process behavior
malware
malware detection
malware threats
memory data structure identification
memory forensic analysis
Metrics
microsoft windows
biblio
A Survey on Security of Cloud Environment: Threats, Solutions, and Innovation
Submitted by grigby1 on Wed, 11/14/2018 - 1:15pm
malicious behavior detection
VMI
Virtual machining
virtual machines
Virtual machine monitors
virtual machine monitor
virtual machine introspection techniques
tenant network
security of data
security
Resiliency
resilience
pubcrawl
Monitoring
misuse detection techniques
malware
attack taxonomy
machine learning
intrusion detection techniques
expandability
data mining techniques
Data mining
Compositionality
CloudVMI
CloudI
Cloud Security
cloud introspection
cloud computing environment
Cloud Computing
block chain technology
behavior analysis
biblio
Trustworthy Services Built on Event-Based Probing for Layered Defense
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
Memory management
watchdogs
VMI
Virtual machine monitors
virtual appliance
Trustworthy Systems
trustworthy services
trustworthy logging
Trusted Computing
system monitoring
system hangs
Resiliency
Registers
pubcrawl
Probes
Monitoring
Attack detection
layered defense
Intrusion Detection
IDS
hypervisor
Hardware
guest-system-call events
feature extraction
event-based probing
defense-in-depth
cyber physical systems
composability
cloud-tuned intrusion detection system
cloud computing environments
Cloud Computing
biblio
Data-centric phishing detection based on transparent virtualization technologies
Submitted by BrandonB on Thu, 04/30/2015 - 1:47pm
human perceptual similarity
antiphishing solution
Browsers
cloud
Cloud Computing
color-based fingerprint extraction
color-based fingerprint filtering
color-based fingerprint scaling
component isolation
computer architecture
Computer crime
Data mining
data-centric phishing detection
Detectors
Web sites
Image color analysis
malware
man-in-the-browser attack
MitB attack
online front-ends
phishing attacks
spoofed Web pages
transparent virtualization technologies
virtual machines
virtualisation
VM introspection
VMI
Web pages