Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
virtual machine
biblio
vTC: Machine Learning Based Traffic Classification As a Virtual Network Function
Submitted by grigby1 on Mon, 04/24/2017 - 11:51am
Anomaly Detection
flow classification
machine learning
pubcrawl
security
virtual machine
virtual machine security
virtualization privacy
biblio
An Architecture for Privacy-Preserving and Replicable High-Recall Retrieval Experiments
Submitted by grigby1 on Mon, 04/24/2017 - 11:51am
Experimentation
high recall
privacy
pubcrawl
rest
security
virtual machine
virtual machine security
virtualization privacy
biblio
MobiPlay: A Remote Execution Based Record-and-replay Tool for Mobile Applications
Submitted by grigby1 on Mon, 04/24/2017 - 11:51am
google android
Mobile Application
pubcrawl
record-and-replay
secure virtual mobile platform
security
virtual machine
virtual machine security
biblio
SPLM: Security Protection of Live Virtual Machine Migration in Cloud Computing
Submitted by grigby1 on Mon, 04/24/2017 - 11:51am
Cloud Computing
live migration
pubcrawl
security
virtual machine
virtual machine security
Virtualization
virtualization privacy
biblio
Hardening OpenStack Cloud Platforms Against Compute Node Compromises
Submitted by grigby1 on Wed, 03/29/2017 - 12:25pm
cloud infrastructure security
composability
decomposition
Metrics
network control systems
network control systems security
networked control systems
pubcrawl
Resiliency
security
security scalability
system security
virtual machine
virtual machine security
biblio
Security attack mitigation framework for the cloud
Submitted by BrandonB on Tue, 05/05/2015 - 10:17am
security guarantee
Markov processes
mean time to security failure
MTTSF cloud
privacy losses
private data security
resource consolidation
security
Security Administration
security attack mitigation framework
Markov model
security of data
Silicon
software products
software vulnerabilities
software vulnerability exploits
virtual machine
Virtual machining
virtualisation
virtualization technology
customer trust
attack mitigation plan
availability parameter
business data leaks
Cloud Computing
cloud resource manager
cloud service
Companies
confidentiality parameter
cross-channel attacks
attack graphs
enterprise cloud computing
enterprise cloud solutions
enterprise IT infrastructure
enterprise wide information processing system
hacking techniques
information technology
integrity parameter
markov chain
biblio
Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG
Submitted by BrandonB on Tue, 05/05/2015 - 9:54am
random number generator
Whirlwind RNG
VM snapshots
VM boots
virtualized Linux
virtualized environments
Virtualization
virtual machines
virtual machine
software-based random number generators
cryptographic secrets
not-so-random numbers
Linux RNG systems
Linux
Kernel
Instruments
Hardware
entropy sources
Entropy
Cryptography
biblio
Analysis of Cloud Computing Performance, Scalability, Availability, amp; Security
Submitted by BrandonB on Tue, 05/05/2015 - 9:28am
Availability
Cloud Computing
Computer hacking
internet
parallel computing
parallel processing
Scalability
security
security of data
virtual machine
virtual machines
biblio
Social network security management model using Unified Communications as a Service
Submitted by BrandonB on Tue, 05/05/2015 - 9:25am
security of data
virtual machines
virtual machine
unified communications as a service
UCaaS approach
UCaaS
TRAIN model
Switches
Software as a service
social networks
social networking (online)
Social network services
social network security management model
Servers
access management processes
security management
security conditions
PC-FAST algorithm
multitenant services
multitenancy SaaS application
multi-tenancy
hosted services vulnerability
Communities
communication errors identification
communication errors detection
Cloud Computing
authentication
asynchronous asymmetric communications
« first
‹ previous
1
2
3
4
5