نتایج جستجو برای: vmware
تعداد نتایج: 362 فیلتر نتایج به سال:
VMSoar is a cognitive network security agent designed for both network configuration and long-term security management. It performs automatic vulnerability assessments by exploring a configuration’s weaknesses and also performs network intrusion detection. VMSoar is built on the Soar cognitive architecture, and benefits from the general cognitive abilities of Soar, including learning from exper...
Over a past few decades, VM’s or Virtual machines have sort of gained a lot of momentum, especially for large scale enterprises where the need for resource optimization & power save is humongous, without compromising with performance or quality. They are a perfect environment to experiment with new applications/technologies in a completely secure and closed environment. This paper discusses how...
High Schools of Technology or abbreviated as STT Humble and Berea, are two institutions that under the Director General Christian Guidance in monitoring reporting but must be integrated with Ministry Education Culture through a Neofeeder. So far, existence Bengkayang Regency Berea Ansang, Darit, Landak has become prima donna for undergraduate higher education prospective teachers ministers such...
In this paper we describe a virtual cluster based on the Kernel-based Virtual Machine (KVM) as an alternative to VMWare and Xen. Speci cally we show how the virtual cluster is built and tailored to t virtual organizations. The technique presented in this paper, known as the Virtual Organization Cluster Model, shows great potential for cloud computing. In our implementation, we used a minimalist...
The developing world's cloud computing sector has received considerable attention from global and local IT players, national governments, and international agencies. For example, IBM has established cloud computing centers in China, India, Vietnam, Brazil, and South Korea. Other global cloud players such as Microsoft, VMware, Salesforce, Dell, and Parallels are actively searching for opportunit...
Internet drive-by downloads attacks are the preferred vehicle to infect desktop computers. In this paper, we propose a new URL analysis framework that combines lightweight virtualization and novel modifications to the WINE engine to detect heap spray attacks against applications. In addition, we are able to extract the attack shellcode used to further download other malicious binaries to the vi...
An Automated Approach for the Analysis of Network Access Controls in Cloud Computing Infrastructures
This paper describes an approach for automated security analysis of network access controls in operational Infrastructure as a Service (IaaS ) cloud computing environments. Our objective is to provide automated and experimental methods to analyze firewall access control mechanisms aiming at protecting cloud architectures. In order to determine the accessibilities in virtual infrastructure netwo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید