Results 11 to 20 of about 17,865 (172)

VMI-PL: A monitoring language for virtual platforms using virtual machine introspection

open access: yesDigital Investigation, 2014
With the growth of virtualization and cloud computing, more and more forensic investigations rely on being able to perform live forensics on a virtual machine using virtual machine introspection (VMI). Inspecting a virtual machine through its hypervisor enables investigation without risking contamination of the evidence, crashing the computer, etc.
Westphal, Florian   +3 more
openaire   +5 more sources

Towards virtual machine introspection based security framework for cloud

open access: yesSādhanā, 2019
Virtualization enables provision of resources to users according to their requirement through Infrastructure as a Service (IaaS) delivery model in cloud computing environment. Malicious users could lease cloud resources and use them as platforms to launch attacks.
Bhavesh Borisaniya, Dhiren Patel
openaire   +4 more sources

copick: An open dataset interface and toolkit for collaborative annotation and analysis of cryo-electron tomography data. [PDF]

open access: yesProtein Sci
Abstract Cryo‐electron tomography (cryoET) enables visualization of macromolecular complexes within intact cellular environments. Continued improvements in instrumentation, sample preparation, and data‐processing pipelines have increased both the scale and the complexity of cryoET datasets, making manual analysis challenging.
Ermel UH   +9 more
europepmc   +2 more sources

Access Improvement in Healthcare: Be Quick, but Don't Hurry? [PDF]

open access: yesLearn Health Syst
ABSTRACT Background Access improvement is a fundamental component of value‐based healthcare as it inherently promotes quality by eliminating chokepoints, redundancies, and inefficiencies that could hinder the provisioning of timely care. Yet as healthcare organizations struggle with cost containment, the question of how to most effectively enhance ...
Chen AM.
europepmc   +2 more sources

From the Field to the Laboratory: The Theory‐Practice Research of Peter J. Carnevale

open access: yesNegotiation and Conflict Management Research, EarlyView., 2020
Abstract As colleagues and collaborators, we reflect on the work and legacy of Peter Carnevale, currently professor at the University of Southern California, and recipient of the 2002 Jeffrey Z. Rubin Theory‐to‐Practice Award of the International Association for Conflict Management (IACM). We review Carnevale’s main contributions, including his work on
Linda L. Putnam   +3 more
wiley   +1 more source

Virtualization Security Combining Mandatory Access Control and Virtual Machine Introspection [PDF]

open access: yes2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, 2014
Virtualization has become a target for attacks in cloud computing environments. Existing approaches to protecting the virtualization environment against the attacks are limited in protection scope and are with high overheads. This paper proposes a novel virtualization security solution which aims to provide comprehensive protection of the ...
Win, Thu Yein   +2 more
openaire   +2 more sources

Automatically bridging the semantic gap in machine introspection [PDF]

open access: yes, 2016
Disclosed are various embodiments that facilitate automatically bridging the semantic gap in machine introspection. It may be determined that a program executed by a first virtual machine is requested to introspect a second virtual machine. A system call
Fu, Yangchun, Lin, Zhiqiang
core   +1 more source

Multi-aspect, robust, and memory exclusive guest os fingerprinting [PDF]

open access: yes, 2014
Precise fingerprinting of an operating system (OS) is critical to many security and forensics applications in the cloud, such as virtual machine (VM) introspection, penetration testing, guest OS administration, kernel dump analysis, and memory forensics.
Fu, Y, Gu, Y, Lin, Z, Prakash, A, Yin, H
core   +1 more source

Cognitive Science and Psychology [PDF]

open access: yes, 1994
The protocol algorithm abstracted from a human cognizer's own narrative in the course of doing a cognitive task is an explanation of the corresponding mental activity in Pylyshyn's (1984) virtual machine model of mind.
Chow, Dr Siu L.
core   +1 more source

Virtualization security:the good,the bad and the ugly

open access: yes网络与信息安全学报, 2016
The virtualization security has increasingly drawn widespread attention with the spread of cloud computing in recent years.Thanks to another level of indirection,virtualization can provide stronger isolation mechanisms,as well as bottom-up security ...
Yu-tao LIU,Hai-bo CHEN
doaj   +3 more sources

Home - About - Disclaimer - Privacy