Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Virtual machining
biblio
Detecting Attack Surface With Full-System Taint Analysis
Submitted by aekwall on Thu, 05/19/2022 - 1:37pm
security
Task Analysis
software reliability
Virtual machining
Conferences
pubcrawl
Metrics
composability
malware
fuzzing
software quality
taint analysis
attack surface
dynamic analysis
software certification
virtual machine introspection
biblio
One Layer for All: Efficient System Security Monitoring for Edge Servers
Submitted by grigby1 on Thu, 05/12/2022 - 10:51am
Virtual machining
Xen Mini-OS
virtual machine introspection
privilege separation
virtual machine security
unikernel
cyber physical systems
Intrusion Detection
operating systems
resilience
Cryptography
Libraries
Runtime
composability
Hardware
Resiliency
pubcrawl
Servers
security
biblio
MACHINE LEARNING ALGORITHMS AND THEIR APPLICATIONS IN CLASSIFYING CYBER-ATTACKS ON A SMART GRID NETWORK
Submitted by grigby1 on Thu, 05/12/2022 - 10:50am
Virtual machining
NSL-KDD data set
Hybrid SVM
Detecting Cyberat-tacks
denial of service attack
virtual machine security
FDIA
cyber physical systems
Distributed databases
resilience
Cryptography
real-time systems
composability
SVM
telecommunication traffic
Radio frequency
Resiliency
pubcrawl
Support vector machines
machine learning algorithms
biblio
SEVerity: Code Injection Attacks against Encrypted Virtual Machines
Submitted by grigby1 on Thu, 05/12/2022 - 10:50am
Virtual machine monitors
Encrypted Virtual Machines
Code Execution Attacks
AMD SEV ES
AMD SEV
virtual machine security
outsourcing
cyber physical systems
resilience
Virtualization
Cryptography
Virtual machining
Registers
Memory management
composability
privacy
Resiliency
pubcrawl
Cloud Computing
biblio
A Secure and Formally Verified Linux KVM Hypervisor
Submitted by grigby1 on Thu, 05/12/2022 - 10:50am
Cryptography
security
pubcrawl
Resiliency
Hardware
privacy
composability
Linux
Virtual machining
Virtual machine monitors
information management
resilience
cyber physical systems
virtual machine security
biblio
A Dynamic and Secure Migration Method of Cryptographic Service Virtual Machine for Cloud Environment
Submitted by grigby1 on Thu, 05/12/2022 - 10:49am
quality of service
secure migration
dynamic migration
cryptographic service virtual machine
virtual machine security
cyber physical systems
resilience
cloud environment
Virtual machining
Cryptography
composability
process control
Access Control
Analytical models
Software
Resiliency
pubcrawl
Cloud Computing
biblio
Secure Allocation for Graph-Based Virtual Machines in Cloud Environments
Submitted by grigby1 on Thu, 05/12/2022 - 10:49am
Cryptography
Cloud Computing
machine learning
pubcrawl
Resiliency
data privacy
Topology
composability
side-channel attacks
Virtual machining
resilience
cyber physical systems
data centers
virtual machine security
virtual machine allocation
biblio
DNS Records Secure Provisioning Mechanism for Virtual Machines automatic management in high density data centers
Submitted by grigby1 on Thu, 05/12/2022 - 10:48am
service-oriented architecture
virtual machine
network operations
network interface
DNS records
virtual machine security
Web and internet services
IP address
cyber physical systems
TCPIP
Cryptography
resilience
domain name system
Virtual machine monitors
Virtual machining
composability
Resiliency
pubcrawl
IP networks
Cloud Computing
biblio
Cross-VM Information Leaks in FPGA-Accelerated Cloud Environments
Submitted by grigby1 on Tue, 04/19/2022 - 1:17pm
Bandwidth
Cloud Computing
data centers
Hardware
pubcrawl
Random access memory
resilience
Resiliency
Scalability
Servers
signature based defense
Virtual machining
biblio
Sandbox Detection Using Hardware Side Channels
Submitted by grigby1 on Mon, 03/14/2022 - 12:15pm
security
pubcrawl
collaboration
Hardware
composability
malware
sandboxing
Virtual machining
Policy Based Governance
virtual environments
Malware Analysis
Anti-VM
Covert Side Channels
Sandbox Detection
Side Channel Leakage
1
2
3
4
5
6
7
8
9
next ›
last »