Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
virtual machines
biblio
EL-SEC: ELastic Management of Security Applications on Virtualized Infrastructure
Submitted by
grigby1
on Thu, 12/05/2019 - 9:53am
Attack Analyzer
autonomic VNF instances scaling
clean slate
Cloud Computing
cloud infrastructure
collaboration
computer network security
Control Theory
EL-SEC framework
elastic management of security applications
Elastic Manager
GENI testbed
Human behavior
Human Factors
internetworking
Intrusion Detection
Load management
Metrics
Monitoring
Noise measurement
PI control
PI controllers
PID controllers
Policy
Policy Based Governance
policy governance
proportional integral derivative controllers
pubcrawl
Recursive InterNetwork Architecture
resilience
Resiliency
RINA
SDN
Snort intrusion detection system
software defined networking
three-term control
virtual machines
virtualisation
virtualized infrastructure
virtualized network functions
virtualized security NFs
VNF Snort instances
biblio
Enhanced Secure Mechanism for Virtual Machine Migration in Clouds
Submitted by
grigby1
on Tue, 10/15/2019 - 1:44pm
authentication
authorisation
authorization
AVISPA tool
Cloud Computing
Cloud federations
composability
Computational modeling
computer viruses
data confidentiality
data integrity
DDoS Attacks
enhanced secure mechanism
Human behavior
live migration
live VM migration
malicious viruses
Metrics
mutual authentication
pubcrawl
replay protection
Repudiation
resilience
Resiliency
Software as a service
source nonrepudiation
unauthorized access
Virtualization
virtual machine migration
Virtual machine monitors
virtual machines
VM disk images
vulnerabilities
biblio
CapeVM: A Safe and Fast Virtual Machine for Resource-Constrained Internet-of-Things Devices
Submitted by
grigby1
on Thu, 09/26/2019 - 9:24am
ahead-of-time compilers
collaboration
fault isolation
Human behavior
Human Factors
Metrics
Performance
policy-based governance
pubcrawl
resilience
Resiliency
Safe Coding
Safety
sandbox
sensor nodes
virtual machines
biblio
Secure Out-of-Band Remote Management of Virtual Machines with Transparent Passthrough
Submitted by
grigby1
on Thu, 01/31/2019 - 11:26am
composability
Cryptography
cyber physical systems
Information Leakage
Nested virtualization
pubcrawl
Remote management
Resiliency
virtual machine security
virtual machines
Virtualized systems
biblio
VM processes state detection by hypervisor tracing
Submitted by
grigby1
on Mon, 01/21/2019 - 11:18am
Cloud Computing
privacy
virtualisation
Virtualization
security
Monitoring
pubcrawl
Human behavior
Metrics
Resiliency
virtualization privacy
composability
Virtual machine monitors
virtual machines
Data collection
Virtual machining
cloud
cloud environments
host hypervisor
host kernel tracing
hypervisor tracing
Instruction sets
interactive trace viewer
Performance analysis
physical host level
Trace Compass
virtual machine
Virtual Process
virtual Process State Detection algorithm
VM processes state detection
VM trace analysis algorithm
vPSD
Wait Analysis
wait state
biblio
Detecting DDoS Attack in Cloud Computing Using Local Outlier Factors
Submitted by
grigby1
on Mon, 01/21/2019 - 11:18am
authentication
authorization
Availability
basic integrity
Cloud Computing
cloud computing environment
cloud service provider
composability
Computer crime
computer network security
Conferences
confidentiality
data storage
DDoS attack detection
Dimensional Reasoning
distributed denial of service attack
DR-LOF
higher detection rates
Human behavior
Intrusion Detection
local outlier factors
lower false alarm rate
Metrics
privacy
pubcrawl
Resiliency
Symbolic Aggregate Approximation
Training
virtual machine security
virtual machines
Virtual machining
virtualisation
virtualization privacy
virtualization technique
WEKA
biblio
A Cross-Virtual Machine Network Channel Attack via Mirroring and TAP Impersonation
Submitted by
grigby1
on Mon, 01/21/2019 - 11:17am
Cloud Computing
privacy
data privacy
virtualisation
security
Monitoring
pubcrawl
Human behavior
Metrics
Resiliency
virtualization privacy
composability
computer network security
Virtual machine monitors
virtual machines
IP networks
Bridges
cloud platform
co-located VMs
co-resident VMs
cross-Virtual machine network channel attack
internal cloud virtual network
internal virtual network
logical resource isolation
malicious VM
mirroring
multitenant virtualized cloud environments
Network Channel Attack
network channel attacks
network traffic
openstack
physical machine
security requirements
side channel attacks
Switches
TAP impersonation
virtualization services
VM-to-VM interference
biblio
H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices
Submitted by
grigby1
on Mon, 01/21/2019 - 11:17am
ARM hardware virtualization technique
ARM Hypervisor
composability
data privacy
embedded systems
H-Securebox system
hardened memory data protection framework
Hardware
Human behavior
hypervisor privilege
Internet of Things
IoT devices
Kernel
kernel level attack
kernel privilege
kernel-level memory data
low power consumption
memory data protection strategies
Metrics
microprocessor chips
operating system kernels
privacy
private data
pubcrawl
Resiliency
security
smart phones
types H-Securebox
Virtual machine monitors
virtual machines
virtualisation
Virtualization
virtualization privacy
biblio
Windows Virtualization Architecture For Cyber Threats Detection
Submitted by
aekwall
on Wed, 01/16/2019 - 1:08pm
alert system administrators
composability
cyber breaches
cyber threats detection
Cybersecurity
data structures
hidden security issues
invasive software
Kernel
kernel data structures
learning (artificial intelligence)
machine learning
machine learning techniques
malicious process behavior
malware
malware detection
malware threats
memory data structure identification
memory forensic analysis
Metrics
microsoft windows
Microsoft Windows (operating systems)
prediction tool
prediction tools development
pubcrawl
Real-time monitoring
Resiliency
Rootkits
static methods
system monitoring
target Windows machines
virtual machine introspection
Virtual machine monitors
virtual machines
virtual memory introspection
Virtualization
VMI
Windows operating system
Windows Operating System Security
Windows OS
Windows threat detection
Windows virtualization architecture
Xen hypervisor
biblio
A Survey on Security of Cloud Environment: Threats, Solutions, and Innovation
Submitted by
grigby1
on Wed, 11/14/2018 - 12:15pm
attack taxonomy
behavior analysis
block chain technology
Cloud Computing
cloud computing environment
cloud introspection
Cloud Security
CloudI
CloudVMI
Compositionality
Data mining
data mining techniques
expandability
intrusion detection techniques
machine learning
malicious behavior detection
malware
misuse detection techniques
Monitoring
pubcrawl
resilience
Resiliency
security
security of data
tenant network
virtual machine introspection techniques
virtual machine monitor
Virtual machine monitors
virtual machines
Virtual machining
VMI
1
2
3
4
5
next ›
last »