Cybercompetitions: A survey of competitions, tools, and systems to support cybersecurity education
T Balon, I Baggili - Education and Information Technologies, 2023 - Springer
Over the last decade, industry and academia have worked towards raising students'
interests in cybersecurity through game-like competitions to fill a shortfall of cybersecurity …
interests in cybersecurity through game-like competitions to fill a shortfall of cybersecurity …
Risk-based access control model: A systematic literature review
Most current access control models are rigid, as they are designed using static policies that
always give the same outcome in different circumstances. In addition, they cannot adapt to …
always give the same outcome in different circumstances. In addition, they cannot adapt to …
Deploying Secure Distributed Systems: Comparative Analysis of GNS3 and SEED Internet Emulator
Network emulation offers a flexible solution for network deployment and operations,
leveraging software to consolidate all nodes in a topology and utilizing the resources of a …
leveraging software to consolidate all nodes in a topology and utilizing the resources of a …
Assessment of hypervisor vulnerabilities
A Thongthua, S Ngamsuriyaroj - 2016 International conference …, 2016 - ieeexplore.ieee.org
Hypervisors are the main components for managing virtual machines on cloud computing
systems. Thus, the security of hypervisors is very crucial as the whole system could be …
systems. Thus, the security of hypervisors is very crucial as the whole system could be …
A flexible trust manager for remote attestation in heterogeneous critical infrastructures
Nowadays, critical infrastructures are managed through paradigms such as cloud/fog/edge
computing and Network Function Virtualization (NFV), providing advantages as flexibility …
computing and Network Function Virtualization (NFV), providing advantages as flexibility …
Incident duration model on urban freeways based on classification and regression tree
Z Xiaoqiang, L Ruimin, Y Xinxin - 2009 Second International …, 2009 - ieeexplore.ieee.org
Effective incident management requires accurate prediction of incident duration. In this
paper, classification and regression tree (CART) is employed to model the incident duration …
paper, classification and regression tree (CART) is employed to model the incident duration …
[HTML][HTML] Behind the last line of defense: Surviving soc faults and intrusions
IP Gouveia, M Völp, P Esteves-Verissimo - Computers & Security, 2022 - Elsevier
Today, leveraging the enormous modular power, diversity and flexibility of manycore
systems-on-a-chip (SoCs) requires careful orchestration of complex and heterogeneous …
systems-on-a-chip (SoCs) requires careful orchestration of complex and heterogeneous …
Multiple hardware-separated computer operating systems within a single processor computer system to prevent cross-contamination between systems
O Surdu - US Patent 10,146,940, 2018 - Google Patents
Using a single processor, separate and independent hardware-enforced operating systems
(OS's) are created in a computer, each OS inaccessible by another OS so that malware …
(OS's) are created in a computer, each OS inaccessible by another OS so that malware …
Survivability analysis of VM-based intrusion tolerant systems
Survivability is the capability of a system to provide its services in a timely manner even after
intrusion and compromise occur. In this paper, we focus on the quantitative analysis of …
intrusion and compromise occur. In this paper, we focus on the quantitative analysis of …
[PDF][PDF] Il cloud computing in ambito sanitario tra security e privacy
M Farina - 2019 - shopdata.giuffre.it
Questo importante saggio affronta, con grande rigore, il tema del rapporto tra sanità e
digitalizzazione, che rappresenta una delle sfide principali per la garanzia dell'unico diritto …
digitalizzazione, che rappresenta una delle sfide principali per la garanzia dell'unico diritto …