Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Virtualization
biblio
MTComm Based Virtualization and Integration of Physical Machine Operations with Digital-Twins in Cyber-Physical Manufacturing Cloud
Submitted by
grigby1
on Tue, 12/01/2020 - 3:35pm
application scenarios
Cloud Computing
collaboration
composability
CPMC
Cyber Manufacturing
cyber-physical manufacturing cloud
cyber-physical systems
data visualisation
Digital-Twin
digital-twin simulator
Digital-Twins simulate physical world objects
Human behavior
Human Factors
image classification
Internet scale machine tool communication method
Internet-scale Computing Security
machine sensors
machine tools
manufacturing
manufacturing processes
Metrics
MTComm
MTComm based virtualization
physical machine need
physical machine operations
Policy Based Governance
production engineering computing
pubcrawl
resilience
Resiliency
Scalability
Solid modeling
Three-dimensional displays
virtual images
Virtualization
visualization
biblio
Future edge clouds
Submitted by
aekwall
on Mon, 11/30/2020 - 11:04am
Cloud Computing
Servers
Hardware
Resiliency
Human behavior
pubcrawl
composability
Metrics
Software systems
Virtualization
policy governance
software packages
Internet-scale Computing Security
biblio
Ontology-based Dynamic and Context-aware Security Assessment Automation for Critical Applications
Submitted by
aekwall
on Mon, 11/02/2020 - 1:46pm
application configurations
application security
automation
Business
context-aware security assessment automation
critical infrastructure
Dynamic Application Security Testing
Measurement
metrics testing
Metrics
Ontologies
ontologies (artificial intelligence)
Ontology
ontology-based dynamic security assessment automation
ontology-based security model
pubcrawl
quantifiable security assessment process
security aptitude
security assessment architecture
Security Metrics
security of data
security testing
standards
testing
tools
ubiquitous computing
virtualisation
Virtualization
biblio
Comprehensive VM Protection Against Untrusted Hypervisor Through Retrofitted AMD Memory Encryption
Submitted by
grigby1
on Mon, 11/02/2020 - 10:40am
encryption
Hardware
Memory management
pubcrawl
Science of Security
Virtual machine monitors
Virtualization
biblio
A Method for Performance Optimization of Virtual Network I/O Based on DPDK-SRIOV*
Submitted by
grigby1
on Mon, 11/02/2020 - 10:40am
cyber security
data plane development kit
DPDK-SRIOV
DPDK-SRIOV.
general hardware platform
Hardware
high-performance network
i-o systems security
I/O requirement
i/o systems security
I/O throughput performance
input-output programs
Kernel
network security testing devices
optimisation
optimization
performance evaluation
performance optimization
physical network card
pubcrawl
Scalability
security of data
SRIOV technology
Switches
Throughput
virtual machines
virtual network
virtual network security tester
virtualisation
Virtualization
virtualized network
biblio
Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments
Submitted by
grigby1
on Thu, 10/29/2020 - 10:59am
Ad-hoc Cloud
Cloud Computing
Compositionality
computational devices
computer architecture
computer network security
Containers
edge computing
fog architecture
Fog computing
Internet of Things
Intrusion Detection
IoT
IoT devices
IoT networks
live migrations
manet privacy
MANETs
Metrics
mobile ad-hoc networks
pubcrawl
resilience
Resiliency
security
Task Analysis
untrustworthy IoT environments
VCC
Vehicular cloud
vehicular cloud computing
Virtualization
biblio
Lightweight Virtualization Approaches for Software-Defined Systems and Cloud Computing: An Evaluation of Unikernels and Containers
Submitted by
aekwall
on Tue, 09/08/2020 - 9:16am
Cloud Computing
Servers
virtualisation
Kernel
Resiliency
Human behavior
pubcrawl
Metrics
software libraries
Containers
performance evaluation
cloud
Virtualization
operating systems (computers)
virtual machines
operating systems
Virtual machine monitors
big monolithic applications
cloud infrastructure components
Docker Containers
Docker LinuxKit
hardware infrastructure
legacy unikernels
lightweight virtualization approaches
lightweight virtualization technologies
software defined cloud computing
software defined systems
software-defined systems
unikernel technologies
Unikernels
clean slate
policy governance
biblio
Enhancing the Reliability of NFV with Heterogeneous Backup
Submitted by
aekwall
on Mon, 07/27/2020 - 11:14am
security of data
Cloud Computing
virtualisation
security
Software
game theory
Resiliency
pubcrawl
composability
Reliability
game theory analysis
Load modeling
Games
Virtualization
computer centres
NFV
Switches
network function virtualization
intrusion tolerance
back-up procedures
Backup
data center environments
flexible end-to-end service chaining
Heterogeneous
heterogeneous backup strategy
NFV SFC
scalable end-to-end service chaining
Service Chain
virtual network function
VNF executor
biblio
[Research Paper] Combining Obfuscation and Optimizations in the Real World
Submitted by
aekwall
on Mon, 07/20/2020 - 9:55am
Cryptography
Kernel
Resiliency
pubcrawl
composability
Metrics
optimization
tools
optimisation
Heuristic algorithms
obfuscation
scheduling
Virtualization
reverse engineering
program compilers
Code Obfuscation
code obfuscator
code tangling techniques
industrial-strength obfuscator
Job shop scheduling
multicriteria optimization problem
pass combinations
pass ordering
pass scheduling problem
reverse engineer
rewriting systems
scheduling code transformations
sequential pass management techniques
tool-specific countermeasures
white-box encryption calls
white box cryptography
biblio
Research on Time Concealed Channel Technology of Cloud Computing Platform Based on Shared Memory
Submitted by
grigby1
on Thu, 07/16/2020 - 11:18am
Analytical models
Cloud Computing
cloud computing platform
cloud platform
composability
Compositionality
covert channel
covert channel detection
covert channel interference
covert channels
data leakage
Entropy
Interference
interference methods
pubcrawl
resilience
Resiliency
Scalability
security
security issues
security of data
shared memory
shared memory systems
shared memory time covert channels
time concealed channel technology
time-covert channels
Virtual machining
Virtualization
1
2
3
4
5
6
7
8
9
next ›
last »