Results 21 to 30 of about 38,187 (179)
Catch ID if You CAN: Dynamic ID Virtualization Mechanism for the Controller Area Network
The controller area network (CAN) is the most widely used in-vehicle network to communicate among electronic control units. However, the CAN does not provide security functionalities, such as encryption or message authentication.
Hyunjin Sun +4 more
doaj +1 more source
Research on Virus Killing Problem Under Virtual Environment [PDF]
The traditional security services mostly put virus killing entities inside the users’ operating systems,which causes huge resource expenditure and waste,and the security software itself is in the unsafe environment,thus being easily destroyed by ...
FENG Wenlin
doaj +1 more source
Research on Security of Virtualization on Cloud Computing
In recent years,followed by developing and popularizing of cloud computing service,the security problems appear. One of the problems,virtualization security,draws most attention of cloud services providers and security manufacturers.
Xiaodi Wang +4 more
doaj +2 more sources
Virtualization Security Assessment [PDF]
ABSTRACT Enterprises have been increasingly adopting server virtualization technologies in recent years. Security risk identification and related controls have also been receiving increased discussion lately. i Also, guidance is available on virtualization security configurations from independent groups, such as benchmarks from the Center for Internet ...
openaire +1 more source
Features of information security of computer systems
Presented is a comprehensive analysis of the issues of technological independence and information security of the computing system. The systematic approach involves the analysis of protection technologies at all levels of architecture and its interaction
Dmitry P. Zegzhda, Igor Y. Zhukov
doaj +1 more source
System architecture and deployment scenarios for SESAME: small cEllS coordinAtion for Multi-tenancy and Edge services [PDF]
The surge of the Internet traffic with exabytes of data flowing over operators’ mobile networks has created the need to rethink the paradigms behind the design of the mobile network architecture.
Albanese, Antonino +8 more
core +3 more sources
Secure communication technology between network domains based on virtualization avionics platform
In the information interconnection scenario of the new generation wide-body aircraft, there is a large amount of real-time bi-directional data exchange between aircraft control domain and airline information services domain in civil aircraft avionics ...
ZHANG Shuang +5 more
doaj +1 more source
Research and development of virtualization in Wireless sensor networks
Virtualization is foundational for applying both cloud computing and big data. It provides the basis for many platform attributes required to access, store, analyze, and manage the distributed computing components in big data environments. Virtualization
M. Sandeep Kumar, Prabhu. J
doaj +1 more source
SVLAN: Secure & Scalable Network Virtualization
Proceedings 2020 Network and Distributed System Security Symposium (NDSS 2020)
Kwon, Jonghoon +3 more
openaire +2 more sources
Virtual World Security Inspection [PDF]
Virtual property theft is a serious problem that exists in virtual worlds. Legitimate users of these worlds invest considerable amounts of time, effort and real-world money into obtaining virtual property, but unfortunately, are becoming victims of theft in high numbers.
Nicholas Charles Patterson +1 more
openaire +1 more source

