Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
virtual machine security
biblio
Securing Virtual Machines on Cloud through Game Theory Approach
Submitted by grigby1 on Mon, 03/09/2020 - 1:25pm
resource allocation
VMVM
virtualisation
Virtual machining
virtual machines
virtual machine vitality measure
virtual machine security
Virtual machine monitors
virtual environments
virtual environment
utility function
tower defence game
security
Cloud Computing
pubcrawl
Poles and towers
operating systems (computers)
hypervisor
Hardware
Games
game theory approach
game theory
game strategy block
computer games
cloud server failure
biblio
To Detect Malware attacks for an Autonomic Self-Heal Approach of Virtual Machines in Cloud Computing
Submitted by grigby1 on Mon, 03/09/2020 - 1:25pm
public cloud services
Virtual machining
virtual machines memory snapshots API call sequences
virtual machines
virtual machine snapshots
virtual machine security
Virtual machine monitors
unsupervised machine
unattacked virtual machine memory snapshots
supervised machine learning techniques
self-heal approach
self-heal algorithm
Self-Heal
security features
security
API calls
pubcrawl
private cloud environment
private cloud
operating systems
Monitoring
malware attacks
malware
machine learning algorithms
learning (artificial intelligence)
invasive software
Cloud Computing
attack model
application program interfaces
biblio
Alto: Lightweight VMs Using Virtualization-Aware Managed Runtimes
Submitted by grigby1 on Thu, 01/31/2019 - 12:27pm
composability
Cryptography
cyber physical systems
datacenters
Memory management
minimal TCBs
pubcrawl
Resiliency
virtual machine security
Virtualization
biblio
On the Detectability of Control Flow Using Memory Access Patterns
Submitted by grigby1 on Thu, 01/31/2019 - 12:27pm
composability
Cryptography
cyber physical systems
memory access patterns
pubcrawl
Resiliency
secure encrypted virtualization
shielding systems
Side-Channels
virtual machine security
biblio
Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection
Submitted by grigby1 on Thu, 01/31/2019 - 12:27pm
composability
Cryptography
cyber physical systems
pubcrawl
Resiliency
virtual machine security
biblio
A Memory-Deduplication Side-Channel Attack to Detect Applications in Co-Resident Virtual Machines
Submitted by grigby1 on Thu, 01/31/2019 - 12:27pm
Cloud Computing
composability
Cryptography
cyber physical systems
pubcrawl
Resiliency
security
Side-channel attack
virtual machine security
Virtualization
biblio
Secure Out-of-Band Remote Management of Virtual Machines with Transparent Passthrough
Submitted by grigby1 on Thu, 01/31/2019 - 12:26pm
composability
Cryptography
cyber physical systems
Information Leakage
Nested virtualization
pubcrawl
Remote management
Resiliency
virtual machine security
virtual machines
Virtualized systems
biblio
Virtual Machine Introspection Based Cloud Monitoring Platform
Submitted by grigby1 on Thu, 01/31/2019 - 12:26pm
composability
Cryptography
cyber physical systems
KVM
Monitoring
pubcrawl
Resiliency
security
virtual machine introspection
virtual machine security
biblio
Spectres, Virtual Ghosts, and Hardware Support
Submitted by grigby1 on Mon, 01/21/2019 - 12:18pm
compiler-based virtual machines
composability
Human behavior
Metrics
Operating systems security
privacy
pubcrawl
Resiliency
secure computer architectures
speculation-based side channels
virtual machine security
virtualization privacy
biblio
Detecting DDoS Attack in Cloud Computing Using Local Outlier Factors
Submitted by grigby1 on Mon, 01/21/2019 - 12:18pm
Symbolic Aggregate Approximation
Human behavior
Intrusion Detection
local outlier factors
lower false alarm rate
Metrics
privacy
pubcrawl
Resiliency
higher detection rates
Training
virtual machine security
virtual machines
Virtual machining
virtualisation
virtualization privacy
virtualization technique
WEKA
computer network security
authorization
Availability
basic integrity
Cloud Computing
cloud computing environment
cloud service provider
composability
Computer crime
authentication
Conferences
confidentiality
data storage
DDoS attack detection
Dimensional Reasoning
distributed denial of service attack
DR-LOF
« first
‹ previous
1
2
3
4
5
6
next ›
last »