Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
virtual machine
biblio
Real-time detection and mitigation of distributed denial of service (DDoS) attacks in software defined networking (SDN)
Submitted by aekwall on Wed, 12/18/2019 - 2:24pm
SDN
virtual machines
virtual machine
Software Defined Network (SDN)
sFlow mitigation technology
sFlow
real time detection
Mininet
DDoS attack mitigation
distributed denial of service attacks
telecommunication control
Switches
resilience
Attack detection
Computer crime
OpenFlow
network traffic
Metrics
composability
pubcrawl
Human behavior
DDoS Attacks
software defined networking
real-time systems
Protocols
telecommunication traffic
DDoS
computer network security
biblio
VM processes state detection by hypervisor tracing
Submitted by grigby1 on Mon, 01/21/2019 - 12:18pm
virtualisation
security
Trace Compass
virtual machine
Virtual machine monitors
virtual machines
Virtual machining
Virtual Process
virtual Process State Detection algorithm
Resiliency
Virtualization
virtualization privacy
VM processes state detection
VM trace analysis algorithm
vPSD
Wait Analysis
wait state
Instruction sets
Cloud Computing
cloud environments
composability
Data collection
host hypervisor
host kernel tracing
Human behavior
hypervisor tracing
cloud
interactive trace viewer
Metrics
Monitoring
Performance analysis
physical host level
privacy
pubcrawl
biblio
A First Look: Using Linux Containers for Deceptive Honeypots
Submitted by grigby1 on Mon, 11/19/2018 - 12:24pm
deception
honey pots
honeypots
Human Factors
Linux containers
pubcrawl
resilience
Resiliency
Scalability
virtual machine
biblio
Performance Evaluation of VM-based Intrusion Tolerant Systems with Poisson Arrivals
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
mean-time-to-security failure
VM-based intrusion tolerant systems
virtual machines
virtual machine
Transforms
sensitive information
Resiliency
pubcrawl
poisson arrivals
Poisson arrival process
ntrusion tolerance
Nickel
MTTSF
composability
mean time to security failure
M/G/1 queueing system
Laplace-Stieltjes transforms
Laplace-Stieltjes transform
intrusion tolerance
fault-tolerant scheme
Fault tolerant systems
fault tolerance
Computers
computer security
computer network security
biblio
Mean Time to Security Failure of VM-Based Intrusion Tolerant Systems
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
QoS
VM-based intrusion tolerant systems
Virtualization
virtual machines
virtual machine
Time factors
security of data
security
Resiliency
queueing theory
quality of service
composability
pubcrawl
MTTSF
mean time to security failure
Markov processes
Markov model
intrusion tolerance
Electronic mail
Computers
Computational modeling
biblio
Lightweight Examination of DLL Environments in Virtual Machines to Detect Malware
Submitted by grigby1 on Mon, 04/24/2017 - 11:52am
attacks on DLL files
lightweight monitoring
malware detection through hypervisor
pubcrawl
security
virtual machine
virtual machine security
biblio
VNToR: Network Virtualization at the Top-of-Rack Switch
Submitted by grigby1 on Mon, 04/24/2017 - 11:52am
network virtualization
pubcrawl
security
security groups
SR-IOV
top-of-rack switch
virtual machine
virtual machine security
biblio
JCrypt: Towards Computation over Encrypted Data
Submitted by grigby1 on Mon, 04/24/2017 - 11:52am
data confidentiality
Encryption Scheme Inference
Information Flow
Polymorphism
pubcrawl
security
virtual machine
virtual machine security
biblio
A Review of Game-Theoretic Approaches for Secure Virtual Machine Resource Allocation in Cloud
Submitted by grigby1 on Mon, 04/24/2017 - 11:52am
Cloud Computing
Game-Theory
Payoff
Player
pubcrawl
security
virtual machine
virtual machine security
Virtualization
biblio
Binary Protection Using Dynamic Fine-grained Code Hiding and Obfuscation
Submitted by grigby1 on Mon, 04/24/2017 - 11:52am
Binary Protection
obfuscation
pubcrawl
security
Self-modifying Code
software protection
virtual machine
virtual machine security
« first
‹ previous
1
2
3
4
5
next ›
last »