Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
KVM
biblio
Endpoint Cloud Terminal as an Approach to Secure the Use of an Enterprise Private Cloud
Submitted by grigby1 on Thu, 09/16/2021 - 4:07pm
Metrics
Workstations
Virtualization
Software
SoC
security
Scientific Computing Security
Resiliency
resilience
pubcrawl
cloud
KVM
information security
Hardware
endpoint cloud terminal
Employment
computer security
Compositionality
Cloud Computing
biblio
Data Analytics Layer For high-interaction Honeypots
Submitted by grigby1 on Mon, 03/09/2020 - 1:27pm
hyper-visor based security services
live VMs
Linux based hypervisor
Linux
LibVMI
KVM
Kernel-based Virtual Machine (KVM)
IOCs (Indicators of compromise)
IOCs
invasive software
intrusion detection system
malware
Human Factors
honeypot
honey pots
high-interaction honeypots
data analytics layer
data analysis
computer systems security
cloud computing paradigm
Cloud Computing
virtual honeypots
VMM
VMI (Virtual machine introspection)
virtualization rejuvenation
Virtualization
virtualisation
Virtual machining
virtual machines
virtual machine security
Virtual machine monitors
virtual machine introspection
volatility plug-ins
structure threat information expression
STIX (Structure Threat Information Expression)
STIX
Scalability
Resiliency
pubcrawl
Organizations
Monitoring
malware attack
biblio
Virtual Machine Introspection Based Cloud Monitoring Platform
Submitted by grigby1 on Thu, 01/31/2019 - 12:26pm
composability
Cryptography
cyber physical systems
KVM
Monitoring
pubcrawl
Resiliency
security
virtual machine introspection
virtual machine security
biblio
Assessment of Hypervisor Vulnerabilities
Submitted by grigby1 on Mon, 11/20/2017 - 12:22pm
testing
policy-based governance
Ports (Computers)
pubcrawl
Resiliency
security
security of data
Security weakness
security weaknesses
Software
Policy
virtual machine management
Virtual machine monitors
virtual machines
Virtual machining
virtualisation
Virtualization
VMware ESXi
Vulnerability Analysis and Assessment
Governance
Cloud Computing
cloud computing systems
collaboration
CVE
CVSS
CVSS information
CWE
ESXi Web interface
Citrix XenServer
Government
HTTP response splitting
Human behavior
hypervisor security
hypervisor vulnerability assessment
KVM
Metrics
NIST 800-115 security testing framework