Virtual machine

Results: 2512



#Item
241Software / System software / Computing / Hypervisor / Hyper-V / Virtual machine / Virtualization / VM / Rootkit / Protection ring / Hardware virtualization / Embedded hypervisor

Attacking Hypervisors via Firmware and Hardware Mikhail Gorobets, Oleksandr Bazhaniuk, Alex Matrosov, Andrew Furtak, Yuriy Bulygin Advanced Threat Research

Add to Reading List

Source URL: www.intelsecurity.com

Language: English - Date: 2015-08-07 18:08:29
242

International Journal of Information Science and Computer Application (IJISCA) Vol), ppFormal Hash Compression Provenance Techniques for the Preservation of the Virtual Machine Log Auditor Environment Sean

Add to Reading List

Source URL: www.proficiencylabs.com

Language: English - Date: 2013-04-16 18:45:13
    243Computing / Software / Java platform / Object-oriented programming languages / Cross-platform software / Build automation / Compiling tools / Groovy / Grails / Java bytecode / Java virtual machine / Java

    volume two | issue three | march, 2009 in this issue : AJAX

    Add to Reading List

    Source URL: blog.groovymag.com

    Language: English - Date: 2009-03-02 09:23:01
    244Software / System software / Computing / Hypervisor / AS/400 / Power Architecture / Hyper-V / Virtual machine / Virtualization / Logical partition / Protection ring / Tandem Computers

    Hypervisor-based Fault-tolerance Thomas C. Bressoud Isis Distributed Systems

    Add to Reading List

    Source URL: css.csail.mit.edu

    Language: English - Date: 2014-12-08 14:33:01
    245Computer networking / Network architecture / Hardware virtualization / Open vSwitch / 6WIND / Network function virtualization / Single-root input/output virtualization / Virtual machine / I/O virtualization / Hyper-V / Hypervisor / VM

    WHITE PAPER Hardware Versus Software Switching Any infrastructure will become obsolete over time, and need to evolve to adapt to changing usage

    Add to Reading List

    Source URL: www.6wind.com

    Language: English - Date: 2014-12-03 23:47:48
    246

    Rage Against The Virtual Machine: Hindering Dynamic Analysis of Android Malware Thanasis Petsas, Giannis Voyatzis, Elias Athanasopoulos, Sotiris Ioannidis,

    Add to Reading List

    Source URL: www.syssec-project.eu

    Language: English - Date: 2014-07-07 09:14:35
      247Software / Computing / System software / Network architecture / 6WIND / Open vSwitch / Data Plane Development Kit / Network function virtualization / Hyper-V / VM / OpenStack / Virtual machine

      S P E E DS E R I E S VirtualAccelerator™ Linux bridge), 6WIND Virtual Accelerator supports a complete set of networking protocols to provide a complete virtual networking infrastructure, including but not limited to:

      Add to Reading List

      Source URL: www.6wind.com

      Language: English - Date: 2015-12-18 16:02:58
      248

      Journal of Information Assurance and Security. ISSNVolumepp. 398–406 © MIR Labs, www.mirlabs.net/jias/index.html A Formal Temporal Log Data Model for the Global Synchronized Virtual Machine Enviro

      Add to Reading List

      Source URL: www.proficiencylabs.com

      Language: English - Date: 2013-04-16 18:43:04
        249

        Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware Thanasis Petsas,* Giannis Voyatzis,* Elias Athanasopoulos,* Michalis Polychronakis,† Sotiris Ioannidis* *

        Add to Reading List

        Source URL: users.ics.forth.gr

        Language: English - Date: 2014-04-24 09:36:10
          250Continuous availability / Stratus Technologies / Data management / High availability / Hardware virtualization / Virtual machine / Virtualization / Storage area network / Virtual Iron / Marathon Technologies

          PDF Document

          Add to Reading List

          Source URL: www.stratus.com

          Language: English - Date: 2016-01-18 14:08:40
          UPDATE