Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Virtualization
biblio
A Unique Deep Intrusion Detection Approach (UDIDA) for Detecting the Complex Attacks
Submitted by grigby1 on Fri, 01/13/2023 - 11:50am
Support vector machines
Intrusion Detection
pubcrawl
resilience
Resiliency
Radio frequency
Scalability
Protocols
network security
deep learning
Intrusion Detection System (IDS)
Virtualization
Sensitivity
Security by Default
computer networks
software-defined network (SDN)
biblio
Performance Impact of Host Kernel Page Table Isolation on Virtualized Servers
Submitted by grigby1 on Thu, 09/29/2022 - 3:45pm
Servers
pubcrawl
Hardware
performance evaluation
Scalability
Benchmark testing
Registers
Linux
Virtual machining
Virtualization
i-o systems security
Performance
Linux kernel
ARMv8
KPTI
x86
biblio
Design and Application of Converged Infrastructure through Virtualization Technology in Grid Operation Control Center in North Eastern Region of India
Submitted by grigby1 on Thu, 09/29/2022 - 3:44pm
i-o systems security
wide area measurements
SCADA/EMS
power system
OT integration
IT
grid operation infrastructure
converged infrastructure
power system reliability
HCI
Reliability engineering
Schedules
WAMS
Reliability
resource management
design
Virtualization
Scalability
Software
pubcrawl
security
biblio
Latency Analysis of I/O Virtualization Techniques in Hypervisor-Based Real-Time Systems
Submitted by grigby1 on Thu, 09/29/2022 - 3:43pm
security
pubcrawl
Hardware
Safety
Scalability
delays
real-time systems
real time systems
Virtualization
Virtual machine monitors
Measurement
i-o systems security
hypervisor
I/O virtualization
latency analysis
response time analysis
biblio
Virtualization in Mobile Cloud Computing for Augmented Reality Challenges
Submitted by grigby1 on Fri, 09/09/2022 - 1:53pm
Cloud Computing
security
pubcrawl
Human behavior
Metrics
resilience
privacy
composability
Virtualization
taxonomy
virtualization privacy
Mobile communication
Systems architecture
Resiliency
mobile cloud computing
biblio
Research on Data Security in Big Data Cloud Computing Environment
Submitted by grigby1 on Mon, 06/13/2022 - 2:36pm
Cloud Computing
pubcrawl
resilience
Resiliency
Scalability
information technology
Big Data
Data Security
maintenance engineering
Virtualization
security policy
Metrics
data integrity
big data security in the cloud
big data cloud computing
biblio
Information Security Practice of Intelligent Knowledge Ecological Communities with Cloud Computing
Submitted by grigby1 on Wed, 06/08/2022 - 12:56pm
encryption
Cloud Computing
information security
security
pubcrawl
resilience
Guidelines
Virtualization
Compositionality
Scalability
Consumer electronics
Knowledge engineering
Resiliency
intelligent data
Ecological Communities
Intelligent Knowledge
biblio
Bare-metal hypervisor virtual servers with a custom-built automatic scheduling system for educational use
Submitted by grigby1 on Tue, 05/24/2022 - 12:51pm
Metrics
virtual server
software programming
computer science
Costs
hypervisor
Focusing
Processor scheduling
ethics
virtual laboratory
Compositionality
Schedules
Virtual machine monitors
Virtualization
composability
Information Assurance
Resiliency
resilience
Human behavior
pubcrawl
Training
biblio
SEVerity: Code Injection Attacks against Encrypted Virtual Machines
Submitted by grigby1 on Thu, 05/12/2022 - 9:50am
outsourcing
Virtualization
Virtual machining
virtual machine security
Virtual machine monitors
Resiliency
resilience
Registers
pubcrawl
privacy
virtualization privacy
Memory management
Encrypted Virtual Machines
cyber physical systems
Cryptography
composability
Code Execution Attacks
Cloud Computing
AMD SEV ES
AMD SEV
biblio
Implementing a Method for Docker Image Security
Submitted by grigby1 on Thu, 05/12/2022 - 9:49am
Cryptography
information security
pubcrawl
Resiliency
telecommunication traffic
composability
static analysis
malware
Containers
Virtualization
resilience
dynamic analysis
cyber physical systems
virtual machine security
docker container security
docker image security
1
2
3
4
5
6
7
8
9
…
next ›
last »