Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Virtualization
biblio
Edge Computing Perspectives: Architectures, Technologies, and Open Security Issues
Submitted by grigby1 on Tue, 01/21/2020 - 11:39am
resilience
virtualization technologies
Virtualization
use-case scenarios
Unikernels
technology development
Servers
security of data
security
Scalability
RTOS
Resiliency
Pervasive Computing Security
real time operating systems
pubcrawl
operating systems (computers)
open security issues
Fog computing
edge computing perspectives
edge computing
Containers
computer architecture
Cloud Computing
biblio
Distributed Denial of Service Attack Prevention at Source Machines
Submitted by grigby1 on Wed, 12/18/2019 - 2:45pm
source machines
operating system
packet transmission suppression
particle filtering (numerical methods)
pubcrawl
Reliability
reliable DDoS attack prevention scheme
resilience
Resiliency
security
Servers
Metrics
thin hypervisor
throughput overhead
transparent DDoS attack prevention scheme
user experience avoidance
Virtual machine monitors
virtual machines
virtualisation
Virtualization
virtualization overhead reduction
distributed denial of service attack prevention
attack packets
Berkeley packet filter
BitVisor
composability
Computer crime
computer network security
configurable packet filtering mechanism
DDoS Attack
DDoS Attack Prevention
arbitrary packet transmissions
filtering policy
flexible DDoS attack prevention scheme
guaranteed safe code execution mechanism
Hardware
hijacked machines
Human behavior
hypervisor
internet
lightweight DDoS attack prevention scheme
biblio
Software Defined Infrastructure: Rethinking Cybersecurity with a More Capable Toolset
Submitted by grigby1 on Thu, 12/05/2019 - 10:52am
policy governance
Virtualization
software defined infrastructure
software defined
security
SDI
Resiliency
resilience
pubcrawl
clean slate
Policy Based Governance
Policy
Metrics
Human Factors
Human behavior
Cybersecurity
collaboration
biblio
Enhanced Secure Mechanism for Virtual Machine Migration in Clouds
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
source nonrepudiation
Metrics
mutual authentication
pubcrawl
replay protection
Repudiation
resilience
Resiliency
Software as a service
malicious viruses
unauthorized access
Virtualization
virtual machine migration
Virtual machine monitors
virtual machines
VM disk images
vulnerabilities
authentication
live VM migration
live migration
Human behavior
enhanced secure mechanism
DDoS Attacks
data integrity
data confidentiality
computer viruses
Computational modeling
composability
Cloud federations
Cloud Computing
AVISPA tool
authorization
authorisation
biblio
Sugar: Secure GPU Acceleration in Web Browsers
Submitted by grigby1 on Mon, 08/05/2019 - 11:40am
GPU acceleration
Human behavior
Human Factors
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
Systems Security
Virtualization
Web browser
zero trust
biblio
Research and design of cryptography cloud framework
Submitted by aekwall on Mon, 08/05/2019 - 10:37am
cryptography resources
Virtualization
Resiliency
pubcrawl
Hardware
expandability
encryption
cryptography technology
cryptography services
cryptography service demand
Ciphers
cryptography cloud framework
cryptography cloud
Cryptography
composability
cloud environment
cloud cryptography service
cloud cryptography machine
cloud computing mode
Cloud Computing
biblio
On the Feasibility of Generating Deception Environments for Industrial Control Systems
Submitted by aekwall on Mon, 07/01/2019 - 10:10am
SCADA
industrial control
Industrial Control Systems
integrated circuits
networked computer systems
operational ICS
proactive threat intelligence
pubcrawl
Resiliency
ICS networks
SCADA systems
SCADA Systems Security
security of data
supervisory control-and-data acquisition systems
threat intelligence
tools
Virtualization
composability
ICs
Human behavior
generating deception environments
deception
data acquisition systems
data acquisition
cyber threat landscape
cyber security
cyber defense
cyber defenders
critical physical processes
critical infrastructures
critical infrastructure environments
constantly morphing surface
computer network security
biblio
SysTaint: Assisting Reversing of Malicious Network Communications
Submitted by aekwall on Mon, 06/24/2019 - 2:40pm
botnet
communication protocol
Human behavior
Malware Analysis
Metrics
pubcrawl
Resiliency
software reverse engineering
Virtualization
biblio
Evaluating Scalability and Performance of a Security Management Solution in Large Virtualized Environments
Submitted by aekwall on Mon, 06/17/2019 - 10:30am
security scalability
Performance
benchmark
Virtualization
composability
pubcrawl
Scalability
biblio
Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System
Submitted by aekwall on Mon, 03/25/2019 - 9:55am
SDN self-healing mechanisms
fault tolerance
Immune system
multiobjective optimization framework
network orchestration
networking paradigm
quality of service
Run Time
SDN controller
end-to-end packet delay
security cost
security countermeasures
self-healing cyber resilient framework
software defined networking-enabled energy delivery system
Sorting
system resilience
Virtualization
self-healing networks
Cyber Attacks
computer network security
authorisation
computer network management
software defined networking
pubcrawl
composability
optimisation
authentication
cyberattack
resilience
access control rules
automated network management
autonomous attack containment
computational complexity
configurable trust levels
delays
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »