Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Virtualization
biblio
Implementation of Platform Controller and Process Modules of the Edge Computing for IoT Platform
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
edge computing
Human Factors
Pervasive Computing Security
wide area network
process modules
process control
platform controller
IoT platform
edge nodes
distributed processing
data-processing flows
container-based virtualization technology
container technology
encryption
Containers
IoT
Human behavior
resilience
Resiliency
Metrics
pubcrawl
Virtualization
virtualisation
Scalability
computer network security
Internet of Things
biblio
An architecture to manage security services for cloud applications
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
Software
management practice
network services
operation models
Security architectures
security orchestrator
security perimeter
security services
service orchestration
Inspection
software orchestration
Topology
ubiquitous computing
virtual functions
Virtualization
Pervasive Computing Security
Human Factors
security
cyber-security paradigms
cyber-security architecture
cloud-based distributed applications
cloud technologies
cloud application
Human behavior
resilience
Resiliency
Metrics
pubcrawl
computer architecture
Scalability
Monitoring
Cloud Computing
security of data
biblio
HyperPS: A Hypervisor Monitoring Approach Based on Privilege Separation
Submitted by grigby1 on Fri, 03/27/2020 - 11:28am
security of data
policy-based governance
privilege separation
pubcrawl
Registers
resilience
Resiliency
Safe Coding
security
operating system kernels
security-sensitive system resources
system monitoring
system software error
Trusted Computing
trusted environment
Virtual machine monitors
virtual machines
Virtualization
Kernel
cloud environment
collaboration
guest virtual machine security
Human behavior
Human Factors
HyperPS
hypervisor monitoring
hypervisor security
Cloud Computing
KVM hypervisor
Linux
Logic gates
Metrics
microhypervisor reducing attack surface
Monitoring
monolithic operating system
biblio
An Advance Cryptographic Solutions in Cloud Computing Security
Submitted by grigby1 on Fri, 03/27/2020 - 11:28am
Human behavior
Virtualization
Safety
Safe Coding
Resiliency
resilience
pubcrawl
policy-based governance
Metrics
innovative safe cloud computing design
information management
identification mechanism
Human Factors
access management
Fingerprint recognition
encoding
Cryptography
computer security
collaboration
cloud computing security
Cloud Computing
Ciphers
biometrics (access control)
biometric knowledge
biometric coding
biometric
biblio
New security descriptor computing algorithm of Supercomputers
Submitted by aekwall on Mon, 03/16/2020 - 10:41am
information security
pubcrawl
Virtualization
resilience
Predictive Metrics
Compositionality
Scientific Computing Security
MTDF-architecture
security descriptor
Supercomputers
biblio
Data Analytics Layer For high-interaction Honeypots
Submitted by grigby1 on Mon, 03/09/2020 - 1:27pm
hyper-visor based security services
live VMs
Linux based hypervisor
Linux
LibVMI
KVM
Kernel-based Virtual Machine (KVM)
IOCs (Indicators of compromise)
IOCs
invasive software
intrusion detection system
malware
Human Factors
honeypot
honey pots
high-interaction honeypots
data analytics layer
data analysis
computer systems security
cloud computing paradigm
Cloud Computing
virtual honeypots
VMM
VMI (Virtual machine introspection)
virtualization rejuvenation
Virtualization
virtualisation
Virtual machining
virtual machines
virtual machine security
Virtual machine monitors
virtual machine introspection
volatility plug-ins
structure threat information expression
STIX (Structure Threat Information Expression)
STIX
Scalability
Resiliency
pubcrawl
Organizations
Monitoring
malware attack
biblio
Threats Against the Virtual Machine Environment of NFV
Submitted by grigby1 on Mon, 03/09/2020 - 1:26pm
privilege escalation
VM escape threats
Virtualization
virtualisation
architectural modeling
Cloud Computing
computer architecture
computer network security
Hardware
misuse patterns
network function virtualization
NFV
on-demand network functions
Virtual machining
pubcrawl
security
security reference architecture
security threats
Software
UML diagrams
Unified modeling language
virtual machine environment
Virtual machine monitors
virtual machine security
virtual machines
biblio
Security Function Virtualization Based Moving Target Defense of SDN-Enabled Smart Grid
Submitted by grigby1 on Tue, 02/18/2020 - 12:06pm
resilience
Virtualization
virtualisation
virtual security function
software-defined networking
software defined networking
smart power grids
Smart Grids
Servers
security function virtualization
security
SDN-enabled smart grid
SDN security
Scalability
Resiliency
Bandwidth
pubcrawl
power system security
power engineering computing
nonlinear programming
moving target defense
Monitoring
Metrics
integer programming
integer nonlinear programming problem
dynamic defense methods
computer network security
Communication networks
centralized SDN controller
biblio
White Visor: Support of White-Box Switch in SDN-Based Network Hypervisor
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
Routing
white-box switch
white visor
white box cryptography
Virtualization
virtualisation
virtual network
virtual machines
Virtual machine monitors
Switches
software-defined networking
software defined networking
composability
Resiliency
resilience
pubcrawl
Pipelines
networking fabrics
network virtualization
network topology
network management
network hypervisor
Metrics
computer network management
biblio
Micro-Kernel OS Architecture and its Ecosystem Construction for Ubiquitous Electric Power IoT
Submitted by aekwall on Mon, 02/10/2020 - 11:58am
security
operating system kernels
POSIX standard API
power engineering computing
power systems
process based fine-grained real-time scheduling algorithm
pubcrawl
real-time OS
real-time systems
Resiliency
Scalability
scheduling
operating system
security mechanism design
security of data
service process binding
sigma0 efficient message channel
Task Analysis
Trusted Computing
Ubiquitous Computing Security
ubiquitous electric power Internet of Things
ubiquitous electric power IoT
Virtualization
Linux
Containers
ecosystem construction
embedded virtualization
functional security
Human Factors
information security
intelligent interconnection technology
intelligent NARI microkernel
Internet of Things
IoT
IoT OS
computer architecture
Linux Container
Made in China 2025
Metrics
microkernel
microkernel OS architecture
mimicry defense
multicore computing security
NARI microkernel OS
native process sandbox
network security
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »