Results 21 to 30 of about 38,187 (179)

Catch ID if You CAN: Dynamic ID Virtualization Mechanism for the Controller Area Network

open access: yesIEEE Access, 2019
The controller area network (CAN) is the most widely used in-vehicle network to communicate among electronic control units. However, the CAN does not provide security functionalities, such as encryption or message authentication.
Hyunjin Sun   +4 more
doaj   +1 more source

Research on Virus Killing Problem Under Virtual Environment [PDF]

open access: yesJisuanji gongcheng, 2016
The traditional security services mostly put virus killing entities inside the users’ operating systems,which causes huge resource expenditure and waste,and the security software itself is in the unsafe environment,thus being easily destroyed by ...
FENG Wenlin
doaj   +1 more source

Research on Security of Virtualization on Cloud Computing

open access: yesDianxin kexue, 2015
In recent years,followed by developing and popularizing of cloud computing service,the security problems appear. One of the problems,virtualization security,draws most attention of cloud services providers and security manufacturers.
Xiaodi Wang   +4 more
doaj   +2 more sources

Virtualization Security Assessment [PDF]

open access: yesInformation Security Journal: A Global Perspective, 2009
ABSTRACT Enterprises have been increasingly adopting server virtualization technologies in recent years. Security risk identification and related controls have also been receiving increased discussion lately. i Also, guidance is available on virtualization security configurations from independent groups, such as benchmarks from the Center for Internet ...
openaire   +1 more source

Features of information security of computer systems

open access: yesБезопасность информационных технологий, 2021
Presented is a comprehensive analysis of the issues of technological independence and information security of the computing system. The systematic approach involves the analysis of protection technologies at all levels of architecture and its interaction
Dmitry P. Zegzhda, Igor Y. Zhukov
doaj   +1 more source

System architecture and deployment scenarios for SESAME: small cEllS coordinAtion for Multi-tenancy and Edge services [PDF]

open access: yes, 2016
The surge of the Internet traffic with exabytes of data flowing over operators’ mobile networks has created the need to rethink the paradigms behind the design of the mobile network architecture.
Albanese, Antonino   +8 more
core   +3 more sources

Secure communication technology between network domains based on virtualization avionics platform

open access: yesXibei Gongye Daxue Xuebao, 2022
In the information interconnection scenario of the new generation wide-body aircraft, there is a large amount of real-time bi-directional data exchange between aircraft control domain and airline information services domain in civil aircraft avionics ...
ZHANG Shuang   +5 more
doaj   +1 more source

Research and development of virtualization in Wireless sensor networks

open access: yesJOIV: International Journal on Informatics Visualization, 2018
Virtualization is foundational for applying both cloud computing and big data. It provides the basis for many platform attributes required to access, store, analyze, and manage the distributed computing components in big data environments. Virtualization
M. Sandeep Kumar, Prabhu. J
doaj   +1 more source

SVLAN: Secure & Scalable Network Virtualization

open access: yesProceedings 2020 Network and Distributed System Security Symposium, 2020
Proceedings 2020 Network and Distributed System Security Symposium (NDSS 2020)
Kwon, Jonghoon   +3 more
openaire   +2 more sources

Virtual World Security Inspection [PDF]

open access: yesJournal of Networks, 2012
Virtual property theft is a serious problem that exists in virtual worlds. Legitimate users of these worlds invest considerable amounts of time, effort and real-world money into obtaining virtual property, but unfortunately, are becoming victims of theft in high numbers.
Nicholas Charles Patterson   +1 more
openaire   +1 more source

Home - About - Disclaimer - Privacy