Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Hypervisor'
Hypervisor published presentations and documents on DocSlides.
Lucian
by karlyn-bohler
Popa. . Minlan. Yu St...
Chapter 14
by lindy-dunigan
Virtual Machines. Eighth Edition. By William Stal...
CloudVisor
by briana-ranney
: Retrofitting Protection of Virtual Machines in ...
InkTag
by karlyn-bohler
: Secure Applications on an Untrusted Operating s...
HyperSentry: Enabling Stealthy In-context Measurement of Hy
by mitsue-stanley
Ahmed M. Azab. , Peng Ning, Zhi Wang, Xuxian Jian...
NoHype
by test
: . Virtualized Cloud Infrastructure without the ...
Public Cloud Security:
by sherrill-nordquist
Surviving . in a Hostile Multitenant . Environmen...
CloudVisor
by phoebe-click
: Retrofitting Protection of Virtual Machines in ...
NoHype
by min-jolicoeur
: . Virtualized Cloud Infrastructure without the ...
Virtualization and Cloud Computing
by jane-oiler
Vera Asodi. VMware. What is Virtualization?. Virt...
HyperSafe
by debby-jeon
: A Lightweight Approach to Provide Lifetime Hype...
Thwarting Memory Disclosure with Efficient Hypervisor-enfor
by kittie-lecroy
Intra. -domain Isolation. Yutao Liu. , . Tianyu. ...
Virtual Machine Security
by briana-ranney
Design of Secure Operating Systems. Summer 2012. ...
Virtualization and Cloud Computing
by tatyana-admore
Vera Asodi. VMware. What is Virtualization?. Virt...
NoHype : Virtualized Cloud Infrastructure without the Virtualization
by karlyn-bohler
Eric Keller. , . Jakub. . Szefer. , Jennifer Rex...
Commvault & Nutanix
by karlyn-bohler
Technical Training . February 2016. Damian Andre....
Attacking Hypervisors via Firmware and Hardware
by vamput
Mikhail . Gorobets, Oleksandr . Bazhaniuk, Alex . ...
Attacking Hypervisors via Firmware and Hardware
by robaut
Mikhail . Gorobets, Oleksandr . Bazhaniuk, Alex . ...
NoHype : Virtualized Cloud Infrastructure without the Virtualization
by backbays
Eric Keller. , . Jakub. . Szefer. , Jennifer Rexf...
Network Virtualization Hypervisor-to-NVE Control Protocol Requirements
by orlando
draft-kreeger-nvo3-hypervisor-nve-cp-01. Lawrence ...
KVMARM The Design and Implementation of the Linux ARM Hypervisor Christoffer Dal
by phoebe-click
columbiaedu Jason Nieh Department of Compouter Sci...
Sam spencer
by sherrill-nordquist
Server Virtualization. Agenda. Introduction. Hist...
Data Center
by debby-jeon
Virtualization: . Xen. and . Xen. -blanket. Haki...
PS3 Security
by pamella-moone
Julian Wechsler. Overview. Legal Issues. DMCA. Se...
S ecurity challenges in a networked world
by pamella-moone
Theo Dimitrakos. Chief Security Researcher –Sec...
LIP6 – University Pierre and Marie Curie
by yoshiko-marsland
ALTERNATIVE MOBILE NODE . MANAGEMENT IN LISP. Dun...
Alan Shieh
by phoebe-click
Cornell University. Srikanth Kandula. Microsoft R...
HyperSentry
by faustina-dinatale
: . Enabling Stealthy In-context Measurement of H...
DevOps
by luanne-stotts
: . Why . you should . care. Bruce Vincent. Senio...
TRENDS & NETWORK SECURITY
by debby-jeon
Jaime Castañeda . jaimec@juniper.net. Systems En...
SMT @ Microsoft
by phoebe-click
Nikolaj . Bj. ø. rner and Leonardo de Moura. Mic...
Sample graphics that we like
by conchita-marotz
Migration Process Flow:. Project . Initiation. En...
Alan Shieh
by lindy-dunigan
Cornell University. Srikanth Kandula. Albert Gree...
ETTM:
by tatyana-admore
A . Scalable, Fault-tolerant . Network Manager. C...
Privacy Enhancing Technologies
by olivia-moreira
Elaine Shi. Lecture 4 Principles of System Securi...
Mobile I/O virtualization
by stefany-barnette
Harvey Tuch, Staff Engineer, Mobile Virtualizatio...
CoVisor
by calandra-battersby
: A Compositional Hypervisor for Software-Defined...
Kevin Lim*, Jichuan Chang
by liane-varnes
+. , Trevor . Mudge. *, . Parthasarathy. Rangana...
How I Learned to Stop Worrying About the Core and Love
by alida-meadow
Aditi Ghag. 2. Naga Katta. 1,2. , . Mukesh. Hira...
A Survey of Virtual Machine Research
by tatyana-admore
Landon Cox. April 12, 2017. How do we . virtualiz...
Load More...