Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Linux containers
biblio
Secure Distributed Computing on Untrusted Fog Infrastructures Using Trusted Linux Containers
Submitted by aekwall on Mon, 12/30/2019 - 11:15am
distributed computing
Fog Computing and Security
untrusted operating systems
untrusted fog infrastructures
trusted Linux containers
secure distributed computing
Secure computing
OpenSGX platform
Linux containers
Intels Software Guard Extensions technology
Intel Software Guard Extensions (SGX)
fog infrastructure heterogeneity
Fog computing security
Docker
security of data
edge computing
Containers
Computational modeling
pubcrawl
Resiliency
Linux
Trusted Computing
Software
security
Hardware
Scalability
Cloud Computing
biblio
A First Look: Using Linux Containers for Deceptive Honeypots
Submitted by grigby1 on Mon, 11/19/2018 - 11:24am
deception
honey pots
honeypots
Human Factors
Linux containers
pubcrawl
resilience
Resiliency
Scalability
virtual machine
biblio
A novel online CEP learning engine for MANET IDS
Submitted by grigby1 on Wed, 06/20/2018 - 11:23am
resilience
mobile ad hoc network
mobile ad hoc networks
Monitoring
network security part
novel Machine Learning technique
novel online CEP learning engine
Online Rule Generation
Peer-to-peer computing
peer-to-peer networks
Protocols
pubcrawl
Metrics
Resiliency
Routing Protocol
Routing protocols
security
Support vector machines
SVM
telecommunication traffic
vehicular networks
wired networks
wireless ad hoc networks
feature extraction
attack traffic
attacks signatures
battlefield communications
CEP
communications protocols
complex event processing
Compositionality
computer network security
detection engine
detection techniques
Engines
Anomaly Detection
IDS
IDS rules
Intrusion Detection
Intrusion Detection Systems
IPv6
learning (artificial intelligence)
Linux
Linux containers
MANET
MANET IDS
biblio
Towards Proactive SDN-Controller Attack and Failure Resilience
Submitted by grigby1 on Wed, 05/09/2018 - 1:53pm
resilience
moving-target defense
network performance
PAFR
plug-and-play operation
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
proactive SDN-controller attack
pubcrawl
live remote checkpointing
sandboxing
SDN networks
security
Servers
software defined modules
software defined networking
Software-Defined Networks
Virtualization
controller/host isolation
checkpointing
collaboration
composability
computer network performance evaluation
computer network security
Containers
control systems
controller resilience
controller sandboxing mechanism
central SDN controller
data center networks
failure resilience
failure-and-attack-resilient execution
generic hardware platforms
host-based attacks
Linux
Linux containers
Linux-containers
biblio
Fine-Grained Supervision and Restriction of Biomedical Applications in Linux Containers
Submitted by grigby1 on Wed, 05/09/2018 - 1:53pm
program libraries
medical administrative data processing
medical data processing
Monitoring
multidimensional biosignal recordings normalization
operating system
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
Process Supervision
Linux containers
pubcrawl
sandbox
sandboxing
security
security of data
security technologies
system call filtering
System Call Interception
Containers
application analysis
biomedical application restriction
biomedical data
Cloud Computing
collaboration
complex programs
composability
container portability
algorithm development
data analysis
distributed processing
docker-based container
external code repositories
fine-grained restricted environment
fine-grained supervision
Kernel
Linux
biblio
WatchIT: Who Watches Your IT Guy?
Submitted by grigby1 on Mon, 05/22/2017 - 12:42pm
administrator confinement
composability
confinement
Human behavior
Insider Threats
IT threats
Linux containers
organizational security
perforated container
pubcrawl
Resiliency
WatchIT