Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Virtualization
biblio
Lightweight Virtualization Approaches for Software-Defined Systems and Cloud Computing: An Evaluation of Unikernels and Containers
Submitted by aekwall on Tue, 09/08/2020 - 10:16am
Virtual machine monitors
policy governance
clean slate
Unikernels
unikernel technologies
software-defined systems
software defined systems
software defined cloud computing
lightweight virtualization technologies
lightweight virtualization approaches
legacy unikernels
hardware infrastructure
Docker LinuxKit
Docker Containers
cloud infrastructure components
big monolithic applications
Cloud Computing
operating systems
virtual machines
operating systems (computers)
Virtualization
cloud
performance evaluation
Containers
software libraries
Metrics
pubcrawl
Human behavior
Resiliency
Kernel
virtualisation
Servers
biblio
Enhancing the Reliability of NFV with Heterogeneous Backup
Submitted by aekwall on Mon, 07/27/2020 - 12:14pm
NFV
VNF executor
virtual network function
Service Chain
scalable end-to-end service chaining
NFV SFC
heterogeneous backup strategy
Heterogeneous
flexible end-to-end service chaining
data center environments
Backup
back-up procedures
intrusion tolerance
network function virtualization
Switches
security of data
computer centres
Virtualization
Games
Load modeling
game theory analysis
Reliability
composability
pubcrawl
Resiliency
game theory
Software
security
virtualisation
Cloud Computing
biblio
[Research Paper] Combining Obfuscation and Optimizations in the Real World
Submitted by aekwall on Mon, 07/20/2020 - 10:55am
Code Obfuscation
white box cryptography
white-box encryption calls
tool-specific countermeasures
sequential pass management techniques
scheduling code transformations
rewriting systems
reverse engineer
pass scheduling problem
pass ordering
pass combinations
multicriteria optimization problem
Job shop scheduling
industrial-strength obfuscator
code tangling techniques
code obfuscator
Cryptography
program compilers
reverse engineering
Virtualization
scheduling
obfuscation
Heuristic algorithms
optimisation
tools
optimization
Metrics
composability
pubcrawl
Resiliency
Kernel
biblio
Research on Time Concealed Channel Technology of Cloud Computing Platform Based on Shared Memory
Submitted by grigby1 on Thu, 07/16/2020 - 12:18pm
pubcrawl
Virtualization
Virtual machining
time-covert channels
time concealed channel technology
shared memory time covert channels
shared memory systems
shared memory
security of data
security issues
security
Scalability
Resiliency
resilience
Analytical models
interference methods
Interference
Entropy
data leakage
covert channels
covert channel interference
covert channel detection
covert channel
Compositionality
composability
cloud platform
cloud computing platform
Cloud Computing
biblio
A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning
Submitted by grigby1 on Fri, 04/17/2020 - 11:28am
system monitoring
OS kernel
OS resource management
pubcrawl
Registers
resilience
Resiliency
rootkit
run-time features
security of data
OS
target kernel module
TF-IDF method
user-mode rootkit detection
Virtual machine monitors
virtual machines
virtualisation
Virtualization
windows kernel rootkits
Windows Operating System Security
kernel space
feature extraction
Hardware
hardware assisted virtualization technology
invasive software
Kernel
kernel rootkit
kernel rootkit detection approach
kernel rootkit detection solution
kernel rootkit detection system
composability
learning (artificial intelligence)
machine learning
machine learning techniques
malicious kernel module
Metrics
operating system
operating system kernels
operating systems (computers)
biblio
Designing Security-Aware Service Requests for NFV-Enabled Networks
Submitted by grigby1 on Fri, 04/17/2020 - 10:29am
service function chains
Resiliency
resource allocation
resource allocation problem
resource management
security
security aspects
security of data
security requirements
security-aware service request design
resilience
software images
specialized hardware appliances
Substrates
supported service
Switches
virtualisation
Virtualization
virtualization privacy
load-balancers
best practices
Cloud Computing
cloud-based applications
composability
Hardware
high-volume servers
Human behavior
Human Factors
initial SFC requests
Bandwidth
Metrics
network function virtualization
network functions
network service request
NFV environment
NFV-enabled networks
privacy
pubcrawl
biblio
HP-SDDAN: High-Performance Software-Defined Data Access Network
Submitted by grigby1 on Fri, 04/17/2020 - 10:29am
Software
Human Factors
IP networks
Metrics
privacy
programable network rules
pubcrawl
resilience
Resiliency
resource allocation
Human behavior
Software Defined Network
software defined networking
software-defined data access network architecture
software-defined network
storage management
storage resource allocation information
Virtualization
virtualization privacy
data privacy
attribute-based data access control
authorisation
Cloud Computing
cloud environments
cloud platform
composability
data access network
data attributes
Access Control
Data protection
Data Security
differential privacy
Firewalls (computing)
global network management capabilities
global user information
high-performance software-defined data access network
HP-SDDAN implementation
biblio
Undertow: An Intra-Kernel Isolation Mechanism for Hardware-Assisted Virtual Machines
Submitted by grigby1 on Fri, 04/17/2020 - 10:24am
isolation
bug-prone
commodity operating system
critical data
EPT violations
flexible cloud servers
guest kernel
guest virtual machine
Hardware virtualization
hardware-assisted isolation mechanism
hardware-assisted virtual machines
Intel processors
intra-kernel isolation mechanism
isolated environment
boot time
Kernel Protection
multiple restricted Extended Page Table
nested kernel
popular paths
pre-defined EPT
read-only protection
system calls
unpopular paths
untrusted code
untrusted outter kernel
virtualization exception
VMFUNC
virtualization privacy
composability
Cloud Computing
security
Trusted Computing
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data privacy
sensitive data
privacy
storage management
security threats
authorisation
invasive software
Linux
Switches
virtualisation
Virtual machining
Kernel
operating system kernels
Virtual machine monitors
virtual machines
Virtualization
Metrics
security policies
bare-metal machines
biblio
Side Channel Attacks in Computation Offloading Systems with GPU Virtualization
Submitted by grigby1 on Fri, 04/17/2020 - 10:23am
Runtime
Metrics
mobile computing
mobile systems
operating system
privacy
pubcrawl
resilience
Resiliency
Libraries
side channel attack
side channel attacks
side-channel attacks
virtual machine
virtual machines
virtualisation
Virtualization
virtualization privacy
graphics processing units
Cloud Computing
composability
computation offloading systems
computation performance
Cryptography
GPU systems
GPU vendors
GPU virtualization
cloud
high-performance GPUs
Human behavior
Human Factors
intensive computation
Internet of Things
IoT
Kernel
learning (artificial intelligence)
biblio
ATMOSPHERE: Adaptive, Trustworthy, Manageable, Orchestrated, Secure, Privacy-Assuring, Hybrid Ecosystem for Resilient Cloud Computing
Submitted by aekwall on Mon, 04/13/2020 - 10:21am
cyber physical systems
Trustworthy Systems
trustworthy cloud-enabled applications
resilient cloud computing
research and development
project management
privacy-assuring ecosystem
multiinstitutional research and development
distributed cloud computing providers
ATMOSPHERE project
adaptive ecosystem
security
Virtualization
composability
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
Trusted Computing
data privacy
virtualisation
Cloud Computing
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »