Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
virtualization privacy
biblio
Invisible Probe: Timing Attacks with PCIe Congestion Side-channel
Submitted by grigby1 on Fri, 09/09/2022 - 1:54pm
machine learning
pubcrawl
Human behavior
Metrics
resilience
performance evaluation
privacy
Protocols
composability
delays
Switches
graphics processing units
virtualization privacy
side-channel
Resiliency
PCIe
biblio
Remote Attestation of Large-scale Virtual Machines in the Cloud Data Center
Submitted by grigby1 on Fri, 09/09/2022 - 1:54pm
cloud data center
integrity measurement
Hybrid Communication Framework
Group Verification
Resiliency
Remote Attestation
data centers
Concurrent computing
Scalability
virtualization privacy
Cloud Computing
Virtual machining
composability
data privacy
privacy
Conferences
resilience
Metrics
Human behavior
pubcrawl
biblio
Automated Performance Benchmarking Platform of IaaS Cloud
Submitted by grigby1 on Fri, 09/09/2022 - 1:54pm
Benchmark testing
Perfor mance Evaluation
virtual machine
IaaS
Resiliency
Data visualization
Fluctuations
virtualization privacy
Virtual machining
Cloud Computing
composability
privacy
performance evaluation
resilience
Metrics
Human behavior
pubcrawl
biblio
Policy Network Assisted Monte Carlo Tree Search for Intelligent Service Function Chain Deployment
Submitted by grigby1 on Fri, 09/09/2022 - 1:53pm
network security
virtual network function
Monte Carlo Tree Search
Resiliency
service function chain
service function chaining
Reinforcement learning
Monte Carlo methods
virtualization privacy
search problems
composability
privacy
Software
resilience
Metrics
Human behavior
pubcrawl
biblio
Virtualization in Mobile Cloud Computing for Augmented Reality Challenges
Submitted by grigby1 on Fri, 09/09/2022 - 1:53pm
Cloud Computing
security
pubcrawl
Human behavior
Metrics
resilience
privacy
composability
Virtualization
taxonomy
virtualization privacy
Mobile communication
Systems architecture
Resiliency
mobile cloud computing
biblio
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation
Submitted by grigby1 on Fri, 09/09/2022 - 1:53pm
Protocols
virtualization privacy
Virtualization and the cloud
Throughput
Software
Runtime
Resiliency
resilience
pubcrawl
i-o systems security
privacy
operating systems
Metrics
Human behavior
Cryptographic systems (practical attacks on deployed systems)
composability
Cloud Computing
biblio
SEVerity: Code Injection Attacks against Encrypted Virtual Machines
Submitted by grigby1 on Thu, 05/12/2022 - 9:50am
outsourcing
Virtualization
Virtual machining
virtual machine security
Virtual machine monitors
Resiliency
resilience
Registers
pubcrawl
privacy
virtualization privacy
Memory management
Encrypted Virtual Machines
cyber physical systems
Cryptography
composability
Code Execution Attacks
Cloud Computing
AMD SEV ES
AMD SEV
biblio
A Secure and Formally Verified Linux KVM Hypervisor
Submitted by grigby1 on Thu, 05/12/2022 - 9:50am
virtualization privacy
composability
Cryptography
cyber physical systems
Hardware
information management
Linux
privacy
pubcrawl
resilience
Resiliency
security
Virtual machine monitors
virtual machine security
Virtual machining
biblio
Secure Allocation for Graph-Based Virtual Machines in Cloud Environments
Submitted by grigby1 on Thu, 05/12/2022 - 9:49am
virtualization privacy
Cloud Computing
composability
Cryptography
cyber physical systems
data centers
data privacy
machine learning
pubcrawl
resilience
Resiliency
side-channel attacks
Topology
virtual machine allocation
virtual machine security
Virtual machining
biblio
Research on Malware Variant Detection Method Based on Deep Neural Network
Submitted by grigby1 on Mon, 01/10/2022 - 11:31am
Metrics
Virtualization
Software algorithms
sandbox
Resiliency
resilience
pubcrawl
policy-based governance
operating systems
Neural networks
Neural Network Security
virtualization privacy
malware
malicious code
Industrial Information Security
cyber physical systems
convolutional neural network
convolution
control systems
collaboration
Artificial Neural Networks
artificial neural network
1
2
3
4
5
6
next ›
last »