Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
virtual machines
biblio
VM live migration time reduction using NAS based algorithm during VM live migration
Submitted by grigby1 on Wed, 07/18/2018 - 10:14am
unnecessary duplicated data transfer
Signal processing algorithms
SLA
storage data
storage management
Stress
system files
system maintenance
telecommunication traffic
Service Level Agreement
Virtual machine monitors
virtual machines
Virtual machining
virtualisation
Virtualization
virtualization environment
VM live migration time reduction
zero downtime
live virtual machine migration
computer centres
datacenters
file servers
hash map-based algorithm
I-O operations
I-O Systems
i-o systems security
live migration
Cloud Computing
NAS
NAS-based algorithm
network traffic
pubcrawl
Random access memory
random-access storage
Scalability
Servers
biblio
Cloud Task Scheduling Based on Swarm Intelligence and Machine Learning
Submitted by K_Hooper on Wed, 05/02/2018 - 10:38am
Processor scheduling
machine learning algorithm
multicriteria decision
NP-complete problem
operations research
optimisation
optimization
parallel computing
particle swarm optimization
machine learning
pubcrawl
resource allocation
scheduling
scheduling technique
Swarm Intelligence
task makespan minimization
virtual machines
Ant colony optimization
Load management
load balancing scheduling
learning (artificial intelligence)
Honey Bee Optimization
execution time minimization
distributed computing
computational complexity
composability
CloudSim toolkit package
CloudSim
Cloud task scheduling
cloud environments
cloud environment
Cloud Computing
approximation techniques
biblio
CrackDex: Universal and automatic DEX extraction method
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
invasive software
virtual machines
universal unpacking system
universal DEX extraction
smart phones
simulation execution
security of data
Scalability
Resiliency
resilience
pubcrawl
mobile computing
Metrics
Manuals
Libraries
Android (operating system)
Humanoid robots
Human Factors
Human behavior
encryption
DEX restoration
DEX reassembling
DEX packing
CrackDex
automatic DEX extraction
app
antivirus software
Androids
android encryption
Android application packing
biblio
A Scattering Technique for Protecting Cryptographic Keys in the Cloud
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
cryptographic keys protection
on-demand computing
Memory Protection
key-scattering approach
key extraction tools
encryption
encrypted data
Data Analytics
data analysis
private key cryptography
Cloud Security
Cloud Computing
business critical-data
brute force attacks
Big Data
AES cryptographic keys
advanced encryption standard
scattering technique
VMs
VM random access memory
virtual machines
untrusted cloud providers
storage capabilities
standards
standard AES algorithm
Secure Cryptographic Keys
widely used computing paradigm
Scattering
Resilient Security Architectures
Resiliency
random-access storage
Random access memory
RAM
pubcrawl
biblio
Data Protection in OpenStack
Submitted by grigby1 on Tue, 01/16/2018 - 6:33pm
operational cloud deployment
virtual machines
virtual machine images
storage encryption
security of data
security features
Security analysis
Scalability
Resiliency
public domain software
pubcrawl
Pervasive Computing Security
Organizations
basic security controls
OpenStack range
Open Source Software
open source cloud computing platform
Neutrons
Metrics
Human Factors
Hardware
encryption
Data Security
Data protection
cloud providers
Cloud Computing
biblio
Hosting distributed databases on internet of things-scale devices
Submitted by grigby1 on Tue, 01/16/2018 - 6:33pm
Resiliency
pervasive computing
Pervasive Computing Security
physical devices
processing workload
pubcrawl
racked servers
Random access memory
Raspberry Pi
performance evaluation
Scalability
security
sensor nets
storage
system resiliency
testing
virtual machines
Virtual machining
Internet of Things
Cassandra distributed database
computation power
decentralized architecture
Distributed databases
distributed device deployment
Hardware
Human Factors
interconnected devices
benchmarks
Internet of Things-scale devices
IoT nodes
IoT representative devices
IoT-representative device specifications
Metrics
mobile computing
network compression
node configuration
biblio
Machine Learning Based DDoS Attack Detection from Source Side in Cloud
Submitted by grigby1 on Tue, 01/16/2018 - 6:24pm
machine learning based DDoS attack detection
Virtual machining
virtual machines
Virtual machine monitors
virtual machine monitor
telecommunication computing
statistical information
statistical analysis
Servers
Resiliency
pubcrawl
network traffic
network security
network packages
Metrics
Cloud Computing
machine learning algorithms
machine learning
learning (artificial intelligence)
Human behavior
feature extraction
Denial of Service attacks
DDoS attack detection
DDoS Attack
computer network security
Computer crime
composability
cloud server hypervisor
cloud provider
biblio
Survey on data remanence in Cloud Computing environment
Submitted by grigby1 on Wed, 01/10/2018 - 12:38pm
IT concept
Virtualization
virtual machines
Servers
security of data
sanitization
Resiliency
remanence
pubcrawl
privacy
Policy
outsourced sensible data
Media
Cloud Computing
Human Factors
Human behavior
encryption
Data Sanitization
data remanence
Cryptography
confidentiality
Compositionality
collaboration
cloud provider server
cloud computing security
cloud computing environment
biblio
Collaborative Ensemble-Learning Based Intrusion Detection Systems for Clouds
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
fuzzy classifiers
VM failures
virtual machines
Training
security of data
Resiliency
pubcrawl
pattern classification
Learning systems
learning (artificial intelligence)
KDD99
intrusion tolerance
Intrusion Detection Systems
Intrusion Detection
IDS
groupware
Anomaly Detection
fuzzy classifier
Fault-Tolerance
fault tolerant computing
Ensemble Learning
Decision trees
Decision Tree
dataset segmentation
composability
Collaborative Systems
collaborative ensemble-learning
collaboration
cloud-based distributed system
Cloud Computing
Bagging
biblio
Performance Evaluation of VM-based Intrusion Tolerant Systems with Poisson Arrivals
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
mean-time-to-security failure
VM-based intrusion tolerant systems
virtual machines
virtual machine
Transforms
sensitive information
Resiliency
pubcrawl
poisson arrivals
Poisson arrival process
ntrusion tolerance
Nickel
MTTSF
composability
mean time to security failure
M/G/1 queueing system
Laplace-Stieltjes transforms
Laplace-Stieltjes transform
intrusion tolerance
fault-tolerant scheme
Fault tolerant systems
fault tolerance
Computers
computer security
computer network security
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »