Results 101 to 110 of about 13,965 (202)

Secured Software and Hardware Complex with KVM Hyp ervisor and Virtual Machines Architecture Development

open access: yesБезопасность информационных технологий, 2012
This work is devoted to solving the problem of software and hardware complex creation. The complex should be prepared for certification to comply with Russian standards in the field of information security (FSTEK regulations).
V. V. Makarov   +3 more
doaj  

SDN hypervisor oriented vSDN controller placement algorithm

open access: yesDianxin kexue, 2017
With the development of the future internet technology,the future network architecture which utilizes network virtualization as a tool to solve the rigidity of traditional network becomes the main stream.As a new network architecture,software defined ...
Xiaodong DONG   +5 more
doaj   +2 more sources

The Development of Detailed Threats Model Applicable for Information Risk Assessment of Enterprise Information System Virtualization Claster

open access: yesБезопасность информационных технологий, 2015
This research on the development of the model object protection - virtual segment industrial enterprises and the development of threat models, with particular attention paid to assisted virtualization hypervisor type I - full virtualization using the ...
Irina Vladimirovna Mashkina   +2 more
doaj  

Processor Instructions Execution Models in Computer Systems Supporting Hardware Virtualization When an Intruder Takes Detection Countermeasures

open access: yesБезопасность информационных технологий, 2012
We are discussing processor modes switching schemes and analyzing processor instructions execution in the cases when a hypervisor is present in the computer or not. We determine processor instructions execution latency statistics which are applicable for
A. E. Zhukov   +2 more
doaj  

Enabling System Survival Across Hypervisor Failures

open access: yes, 2018
Embedded system’s evolution is notorious and due to the complexity growth, these systems possess more general purpose behaviour instead of its original single purpose features. Naturally, virtualization started to impact this matter. This technology decreases the hardware costs since it allows to run several software components on the same hardware ...
openaire   +2 more sources

A novel autonomous container-based platform for cybersecurity training and research. [PDF]

open access: yesPeerJ Comput Sci, 2023
Chouliaras N   +4 more
europepmc   +1 more source

Mobile SARS‑CoV‑2 screening facilities for rapid deployment and university-based diagnostic laboratory. [PDF]

open access: yesEng Life Sci, 2023
Stanislawski N   +20 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy