Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Migration
biblio
A Related work on secure event logs protection with user identity using privacy preservation for the cloud infrastructure
Submitted by grigby1 on Mon, 05/09/2022 - 4:35pm
computer architecture
Monitoring
pubcrawl
resilience
Resiliency
privacy
Companies
Migration
Cloud Security
Scalability
Informatics
cloud computing security
user privacy in the cloud
cloud infrastructure
identify as a service
biblio
Modeling Virtual Machine Migration as a Security Mechanism by using Continuous-Time Markov Chain Model
Submitted by grigby1 on Mon, 03/09/2020 - 1:26pm
Migration
VM migration
Virtual machining
virtual machines
virtual machine security
virtual machine migration modeling
static security measures
sophisticated methods
Servers
security of data
security mechanism
security
pubcrawl
probability
network topology
model migration
Adaptation models
Markov processes
intrusion
dynamic security measure
dynamic security
dynamic attack surface
destination server parameters
Destination Server
continuous-time Markov Chain model
Computational modeling
complex networks
complex network
cloud environment
cloud computing environment
Cloud Computing
biblio
Proactive DDoS attack detection and isolation
Submitted by grigby1 on Tue, 01/16/2018 - 6:24pm
legitimate clients
Servers
security controls
resource allocation
Resiliency
pubcrawl
proxy level
proactive DDoS attack isolation
proactive DDoS attack detection
MTD
Monitoring
Migration
Metrics
Load management
load balancing
Attack proxy
IP networks
insider-assisted DDoS attack mitigation
Insider-assisted DDoS attack
Human behavior
EDIP
early detection-and-isolation policy
distributed denial of service
DDoS attack detection
Data processing
cyber threat
Cyber Attacks
computer network security
Computer crime
composability