Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Virtualization
biblio
Security Research and Design of Hierarchical Embedded Information Security System
Submitted by grigby1 on Thu, 07/13/2023 - 2:31pm
Virtual machining
virtualization technologies
the protection mechanism
protection rings
protection levels
add-on information security tools
Resiliency
operating systems
Virtualization
information security
maintenance engineering
computer science
composability
embedded systems
Software
resilience
Metrics
pubcrawl
biblio
A Secure Workflow for Shared HPC Systems
Submitted by grigby1 on Fri, 03/03/2023 - 11:15am
Cloud Computing
security
pubcrawl
Human Factors
Metrics
resilience
Resiliency
sensitive data
Virtualization
Reliability
Compositionality
operating systems
High performance computing
iOS Security
Secure computing
biblio
Security Analysis for Virtual Machine Allocation in Cloud Computing
Submitted by grigby1 on Fri, 02/17/2023 - 4:19pm
Cloud Computing
security
pubcrawl
Metrics
resilience
Resiliency
Virtual machining
Virtualization
Virtual machine monitors
Compositionality
cloud service providers
Trusted Computing
Memory
Behavioral sciences
Scientific Computing Security
biblio
MicroBlind: Flexible and Secure File System Middleware for Application Sandboxes
Submitted by grigby1 on Fri, 02/17/2023 - 4:10pm
Cloud Computing
collaboration
security
Peer-to-peer computing
pubcrawl
composability
malware
Virtual machining
Virtualization
File systems
sandboxing
information sharing
policy governance
file system
biblio
Countermeasure Against Anti-Sandbox Technology Based on Activity Recognition
Submitted by grigby1 on Fri, 02/17/2023 - 4:10pm
collaboration
pubcrawl
Data models
privacy
composability
malware
Classification algorithms
Virtualization
sandboxing
Activity Recognition
policy governance
Behavioral sciences
acceleration sensor
anti-sandbox
CNN-LSTM
hook
biblio
A Unique Deep Intrusion Detection Approach (UDIDA) for Detecting the Complex Attacks
Submitted by grigby1 on Fri, 01/13/2023 - 11:50am
Support vector machines
Intrusion Detection
pubcrawl
resilience
Resiliency
Radio frequency
Scalability
Protocols
network security
deep learning
Intrusion Detection System (IDS)
Virtualization
Sensitivity
Security by Default
computer networks
software-defined network (SDN)
biblio
Performance Impact of Host Kernel Page Table Isolation on Virtualized Servers
Submitted by grigby1 on Thu, 09/29/2022 - 3:45pm
Servers
pubcrawl
Hardware
performance evaluation
Scalability
Benchmark testing
Registers
Linux
Virtual machining
Virtualization
i-o systems security
Performance
Linux kernel
ARMv8
KPTI
x86
biblio
Design and Application of Converged Infrastructure through Virtualization Technology in Grid Operation Control Center in North Eastern Region of India
Submitted by grigby1 on Thu, 09/29/2022 - 3:44pm
i-o systems security
wide area measurements
SCADA/EMS
power system
OT integration
IT
grid operation infrastructure
converged infrastructure
power system reliability
HCI
Reliability engineering
Schedules
WAMS
Reliability
resource management
design
Virtualization
Scalability
Software
pubcrawl
security
biblio
Latency Analysis of I/O Virtualization Techniques in Hypervisor-Based Real-Time Systems
Submitted by grigby1 on Thu, 09/29/2022 - 3:43pm
security
pubcrawl
Hardware
Safety
Scalability
delays
real-time systems
real time systems
Virtualization
Virtual machine monitors
Measurement
i-o systems security
hypervisor
I/O virtualization
latency analysis
response time analysis
biblio
Virtualization in Mobile Cloud Computing for Augmented Reality Challenges
Submitted by grigby1 on Fri, 09/09/2022 - 1:53pm
Cloud Computing
security
pubcrawl
Human behavior
Metrics
resilience
privacy
composability
Virtualization
taxonomy
virtualization privacy
Mobile communication
Systems architecture
Resiliency
mobile cloud computing
1
2
3
4
5
6
7
8
9
…
next ›
last »