Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mean time to security failure
biblio
Performance Evaluation of VM-based Intrusion Tolerant Systems with Poisson Arrivals
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
mean-time-to-security failure
VM-based intrusion tolerant systems
virtual machines
virtual machine
Transforms
sensitive information
Resiliency
pubcrawl
poisson arrivals
Poisson arrival process
ntrusion tolerance
Nickel
MTTSF
composability
mean time to security failure
M/G/1 queueing system
Laplace-Stieltjes transforms
Laplace-Stieltjes transform
intrusion tolerance
fault-tolerant scheme
Fault tolerant systems
fault tolerance
Computers
computer security
computer network security
biblio
Mean Time to Security Failure of VM-Based Intrusion Tolerant Systems
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
QoS
VM-based intrusion tolerant systems
Virtualization
virtual machines
virtual machine
Time factors
security of data
security
Resiliency
queueing theory
quality of service
composability
pubcrawl
MTTSF
mean time to security failure
Markov processes
Markov model
intrusion tolerance
Electronic mail
Computers
Computational modeling
biblio
Security attack mitigation framework for the cloud
Submitted by BrandonB on Tue, 05/05/2015 - 10:17am
security guarantee
Markov processes
mean time to security failure
MTTSF cloud
privacy losses
private data security
resource consolidation
security
Security Administration
security attack mitigation framework
Markov model
security of data
Silicon
software products
software vulnerabilities
software vulnerability exploits
virtual machine
Virtual machining
virtualisation
virtualization technology
customer trust
attack mitigation plan
availability parameter
business data leaks
Cloud Computing
cloud resource manager
cloud service
Companies
confidentiality parameter
cross-channel attacks
attack graphs
enterprise cloud computing
enterprise cloud solutions
enterprise IT infrastructure
enterprise wide information processing system
hacking techniques
information technology
integrity parameter
markov chain