Results 111 to 120 of about 5,262 (215)

Using honeypots to model botnet attacks on the internet of medical things. [PDF]

open access: yesComput Electr Eng, 2022
Wang H   +5 more
europepmc   +1 more source

Improving Live Migration Efficiency in QEMU: A Paravirtualized Approach [PDF]

open access: green, 2023
Filippo Storniolo   +2 more
openalex   +1 more source

Trust Domain Extensions Guest Fuzzing Framework for Security Vulnerability Detection

open access: yesMathematics
The Intel® Trust Domain Extensions (TDX) encrypt guest memory and minimize host interactions to provide hardware-enforced isolation for sensitive virtual machines (VMs). Software vulnerabilities in the guest OS continue to pose a serious risk even as the
Eran Dahan   +2 more
doaj   +1 more source

A novel autonomous container-based platform for cybersecurity training and research. [PDF]

open access: yesPeerJ Comput Sci, 2023
Chouliaras N   +4 more
europepmc   +1 more source

The prospects for virtualization of high performance x64 systems

open access: yesТруды Института системного программирования РАН, 2018
In this paper we explore the prospects of virtualization technologies being applied to x64-based high performance systems. The main reasons for performance overhead when running parallel programs inside multiple virtual machines are discussed.
Alexander Kudryavtsev   +2 more
doaj  

Home - About - Disclaimer - Privacy