Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Virtualization
biblio
Bare-metal hypervisor virtual servers with a custom-built automatic scheduling system for educational use
Submitted by grigby1 on Tue, 05/24/2022 - 1:51pm
Metrics
virtual server
software programming
computer science
Costs
hypervisor
Focusing
Processor scheduling
ethics
virtual laboratory
Compositionality
Schedules
Virtual machine monitors
Virtualization
composability
Information Assurance
Resiliency
resilience
Human behavior
pubcrawl
Training
biblio
SEVerity: Code Injection Attacks against Encrypted Virtual Machines
Submitted by grigby1 on Thu, 05/12/2022 - 10:50am
Virtual machine monitors
Encrypted Virtual Machines
Code Execution Attacks
AMD SEV ES
AMD SEV
virtual machine security
outsourcing
cyber physical systems
resilience
Virtualization
Cryptography
Virtual machining
Registers
Memory management
composability
privacy
Resiliency
pubcrawl
Cloud Computing
biblio
Implementing a Method for Docker Image Security
Submitted by grigby1 on Thu, 05/12/2022 - 10:49am
Cryptography
information security
pubcrawl
Resiliency
telecommunication traffic
composability
static analysis
malware
Containers
Virtualization
resilience
dynamic analysis
cyber physical systems
virtual machine security
docker container security
docker image security
biblio
Machine Learning-Based Anomalies Detection in Cloud Virtual Machine Resource Usage
Submitted by grigby1 on Thu, 05/12/2022 - 10:48am
Cloud Security
Virtual machine resource
virtual machine security
cyber physical systems
Technological innovation
Time series analysis
operating systems
resilience
Virtualization
composability
Cryptography
Resiliency
pubcrawl
machine learning
Support vector machines
Forestry
Anomaly Detection
machine learning algorithms
Cloud Computing
biblio
Research on Computer Network Security Protection System Based on Level Protection in Cloud Computing Environment
Submitted by grigby1 on Mon, 04/18/2022 - 11:36am
Cloud Computing
cloud computing security
computer networks
computer network security
Electrical Engineering
Grade protection
information sharing
network security
protection system
pubcrawl
Scalability
security scalability
Virtualization
biblio
TrustZone Based Virtual Architecture of Power Intelligent Terminal
Submitted by grigby1 on Mon, 02/07/2022 - 4:45pm
real-time systems
Microelectronics Security
virtual architecture
power IoT terminal
Embedded System
Microelectronics
TrustZone
Systems architecture
Virtualization
computer architecture
composability
Wireless communication
Resiliency
resilience
Metrics
pubcrawl
security
Internet of Things
biblio
Reducing Docker Daemon Attack Surface Using Rootless Mode
Submitted by grigby1 on Tue, 01/11/2022 - 10:34am
attack surface
container
Containers
daemon
Docker
information management
Metrics
privilege
pubcrawl
resilience
Resiliency
root
rootless
Scalability
scientific computing
Virtualization
biblio
Research on Malware Variant Detection Method Based on Deep Neural Network
Submitted by grigby1 on Mon, 01/10/2022 - 12:31pm
malware
Virtualization
Software algorithms
sandbox
Resiliency
resilience
pubcrawl
policy-based governance
operating systems
Neural networks
Metrics
Neural Network Security
malicious code
Industrial Information Security
cyber physical systems
convolutional neural network
convolution
control systems
collaboration
Artificial Neural Networks
artificial neural network
biblio
Virtual Sensing Networks and Dynamic RPL-Based Routing for IoT Sensing Services
Submitted by aekwall on Mon, 11/29/2021 - 1:55pm
composability
VSN
Virtual groups
sensing resources
routing resources
resource allocation
DODAG routing tree
RPL
resource management
6LoWPAN
sensors
Resiliency
pubcrawl
Heuristic algorithms
Dynamic scheduling
Virtualization
Internet of Things
Routing
IoT
biblio
Hardware-Assisted Isolation Technologies: Security Architecture and Vulnerability Analysis
Submitted by grigby1 on Thu, 09/30/2021 - 2:37pm
Monitoring
Virtualization
Trusted Execution Environment
Trusted Computing Base (TCB)
TEE
security
Resiliency
resilience
pubcrawl
Network Security Architecture
AMD Secure Processor
Isolation technology
Intel SGX
Intel ME
Hardware-assisted isolation
Hardware
Cryptography
computer architecture
ARM TrustZone
1
2
3
4
5
6
7
8
9
…
next ›
last »