Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Windows OS
biblio
Analysis of the Most Common Software and Hardware Vulnerabilities in Microprocessor Systems
Submitted by grigby1 on Thu, 03/04/2021 - 2:45pm
resilience
Metrics
microcomputers
microprocessor systems
Microsoft Windows (operating systems)
network access
Production
Program processors
pubcrawl
remote attack
local computer calculation network
Resiliency
Server Message Block service
Silicon
Software Vulnerability
Transistors
WannaCry trojan encoder
Windows Operating System Security
Windows OS
encryption program
security
authorisation
composability
Computer crime
computer viruses
Computers
Cryptography
Data protection
Windows operating system
File systems
Hardware
hardware algorithm protection
hardware vulnerabilities
hardware vulnerability
information protection
information security
invasive software
biblio
Prevention of Ransomware Execution in Enterprise Environment on Windows OS: Assessment of Application Whitelisting Solutions
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
unauthorized applications
Organizations
pubcrawl
Ransomware
ransomware execution prevention
Resiliency
SecureAPlus
Signature based
Trusted Computing
Microsoft Windows (operating systems)
virtual environment
VoodooShield
whitelisting
Windows edition
Windows Operating System Security
Windows OS
Windows Server edition
zero-day antimalware solution
composability
application control solutions
application whitelisting software
Application Whitelisting Solutions
AppLocker
authorisation
blacklisting
business data processing
CodeShield
administrative privileges
Cryptography
data breach prevention
Databases
enterprise environment
invasive software
malicious files
malware
Metrics
biblio
Windows Virtualization Architecture For Cyber Threats Detection
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
Virtual machine monitors
prediction tool
prediction tools development
pubcrawl
Real-time monitoring
Resiliency
Rootkits
static methods
system monitoring
target Windows machines
virtual machine introspection
Microsoft Windows (operating systems)
virtual machines
virtual memory introspection
Virtualization
VMI
Windows operating system
Windows Operating System Security
Windows OS
Windows threat detection
Windows virtualization architecture
Xen hypervisor
machine learning
composability
cyber breaches
cyber threats detection
Cybersecurity
data structures
hidden security issues
invasive software
Kernel
kernel data structures
learning (artificial intelligence)
alert system administrators
machine learning techniques
malicious process behavior
malware
malware detection
malware threats
memory data structure identification
memory forensic analysis
Metrics
microsoft windows
biblio
Unified Approach for Operating System Comparisons with Windows OS Case Study
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
Three-dimensional displays
operational level benchmarking
operational level performance
OS security features
pubcrawl
resilience
Resiliency
security
security of data
operating systems (computers)
unified approach
unified benchmarking approach
Windows 7
Windows 8
Windows operating system
Windows OS
Windows OS case study
Windows XP
graphics processing units
Benchmark testing
Benchmarking
composability
conventional personal computer
DirectX 11
efficient benchmark systems
gpu
Graphics
automated benchmarking tools
Hardware
hardware level
hardware technology
Metrics
microsoft windows
operating system
operating systems