Results 11 to 20 of about 38,187 (179)

Misuse Patterns from the Threat of Modification of Non-Control Data in Network Function Virtualization

open access: yesFuture Internet, 2022
Network Function Virtualization (NFV) is a virtual network model, the goal of which is a cost-efficient transition of the hardware infrastructure into a flexible and reliable software platform.
Abdulrahman K. Alnaim
doaj   +1 more source

CONTAINER-BASED VIRTUALIZATION FOR BLOCKCHAIN TECHNOLOGY: A SURVEY

open access: yesJordanian Journal of Computers and Information Technology, 2023
Blockchain technology has garnered interest in several scientific and engineering fields. To improve blockchain services, its execution challenges must be addressed.
Nawar A. Sultan, Rawaa Putros Qasha
doaj   +1 more source

Cloud computing services: taxonomy and comparison [PDF]

open access: yes, 2011
Cloud computing is a highly discussed topic in the technical and economic world, and many of the big players of the software industry have entered the development of cloud services.
Höfer, C.N., Karagiannis, G.
core   +2 more sources

Secure silicon: Towards virtual prototyping [PDF]

open access: yes2017 International Symposium on Electromagnetic Compatibility - EMC EUROPE, 2017
Evaluating security vulnerabilities of software implementations at design step is of primary importance for applications developers, while it has received litte attention from scientific communauty. In this paper, we describe virtual prototyping of an implementation of Elliptic curve cryptography (ECC), aiming to make it secure against first-order ...
Sauvage, Laurent   +2 more
openaire   +2 more sources

Management and Service-aware Networking Architectures (MANA) for Future Internet Position Paper: System Functions, Capabilities and Requirements [PDF]

open access: yes, 2009
Future Internet (FI) research and development threads have recently been gaining momentum all over the world and as such the international race to create a new generation Internet is in full swing: GENI, Asia Future Internet, Future Internet Forum Korea,
Abramowicz, H.   +5 more
core   +3 more sources

Securing DMA through virtualization

open access: yes2012 Complexity in Engineering (COMPENG). Proceedings, 2012
We present a solution for preventing guests in a virtualized system from using direct memory access (DMA) to access memory regions of other guests. The principles we suggest, and that we also have implemented, are purely based on software and standard hardware.
Schwarz, Oliver, Gehrmann, Christian
openaire   +4 more sources

Machine Learning-Based Anomaly Detection in NFV: A Comprehensive Survey

open access: yesSensors, 2023
Network function virtualization (NFV) is a rapidly growing technology that enables the virtualization of traditional network hardware components, offering benefits such as cost reduction, increased flexibility, and efficient resource utilization ...
Sehar Zehra   +6 more
doaj   +1 more source

SELinux-based Secure Server Virtualization [PDF]

open access: yesProceedings of the 2012 2nd International Conference on Computer and Information Applications (ICCIA 2012), 2012
Server virtualization is to create and run several independent operation systems at the same time to maximize the utilization efficiency and flexibility of IT resource, the most serious security problem of which, however, is the unauthorized access of unsafe virtual machines.
Xun Yi Ren, Yang Yu
openaire   +1 more source

Secure and Dynamic Memory Management Architecture for Virtualization Technologies in IoT Devices

open access: yesFuture Internet, 2018
The introduction of the internet in embedded devices led to a new era of technology—the Internet of Things (IoT) era. The IoT technology-enabled device market is growing faster by the day, due to its complete acceptance in diverse areas such as ...
Jithin R, Priya Chandran
doaj   +1 more source

Leveraging Virtualization Technology in Teaching Cyber Security Courses in Sub-Saharan Africa

open access: yesIJIE (Indonesian Journal of Informatics Education), 2023
Teaching and learning can be effective and enjoyable if the course is well-packaged and presented. This was the experience of students and teachers participating in our hands-on Cyber Security course.
Clement Amone Keyamo   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy