Results 21 to 30 of about 17,865 (172)
CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha +16 more
core +3 more sources
Checking Function-Level Kernel Control Flow Integrity for Cloud Computing
With the advancement of cloud computing, the control flow integrity (CFI) of virtual machines' kernel becomes more and more important for the security of cloud services. Many CFI checking and protecting approaches have been proposed.
Lin Ye +6 more
doaj +1 more source
On Some Limitations of Information Flow Tracking in Full-system Emulators
Tracking and verification of data flows includes set of techniques that can be applied to make applications more secure, to perform software analysis for debugging or reverse engineering, and so on. Taint analysis is one of the techniques used to control
M. A. Klimushenkova +5 more
doaj +1 more source
Classifying malware attacks in IaaS cloud environments
In the last few years, research has been motivated to provide a categorization and classification of security concerns accompanying the growing adaptation of Infrastructure as a Service (IaaS) clouds. Studies have been motivated by the risks, threats and
Noëlle Rakotondravony +8 more
doaj +1 more source
Dynamic and Transparent Analysis of Commodity Production Systems [PDF]
We propose a framework that provides a programming interface to perform complex dynamic system-level analyses of deployed production systems. By leveraging hardware support for virtualization available nowadays on all commodity machines, our framework is
Fattori, Aristide +3 more
core +1 more source
Providing Self-Aware Systems with Reflexivity
We propose a new type of self-aware systems inspired by ideas from higher-order theories of consciousness. First, we discussed the crucial distinction between introspection and reflexion.
A Church +21 more
core +1 more source
Notes towards an anthropology of the internet
What might an anthropology of the internet look like? It require a combination of introspection, personal judgment and world history to explore the universe of cyberspace. This world is not sufficient to itself, nor is it 'the world'.
Keith Hart
doaj +1 more source
Open Programming Language Interpreters [PDF]
Context: This paper presents the concept of open programming language interpreters and the implementation of a framework-level metaobject protocol (MOP) to support them.
Cazzola, Walter, Shaqiri, Albert
core +2 more sources
Human Capital 4.0: Readiness of Initial Vocational Education Programmes in Italy and Germany
ABSTRACT The rapid pace of technological innovation and the advent of Industry 4.0 have profoundly transformed labour markets and the nature of work. This paper examines the preparedness of Initial Vocational Education and Training (IVET) programmes in Germany and Italy to meet the demands of Human Capital 4.0. Utilising a comparative analysis of three
Luca Antonazzo, Susanne Peters
wiley +1 more source
A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus
Smart campus is an exciting, new, and emerging research area that uses technology and infrastructure to support and improve its processes in campus services, teaching, learning, and research, especially, the explosive growth in knowledge makes the role ...
Zhihong Tian +6 more
doaj +1 more source

