Academic literature on the topic 'Hypervizor hypervisor'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hypervizor hypervisor.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Hypervizor hypervisor"

1

Shetty, Jyoti, Sahana Upadhaya, Rajarajeshwari H S, Shobha G, and Jayant Chandra. "An Empirical Performance Evaluation of Docker Container, Openstack Virtual Machine and Bare Metal Server." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 1 (2017): 205. http://dx.doi.org/10.11591/ijeecs.v7.i1.pp205-213.

Full text
Abstract:
<p>Server virtualization is a fundamental technological innovation that is used extensively in IT enterprises. Server virtualization enables creation of multiple virtual machines on single underlying physical machine. It is realized either in form of hypervisors or containers. Hypervisor is an extra layer of abstraction between the hardware and virtual machines that emulates underlying hardware. In contrast, the more recent container-based virtualization technology runs on host kernel without additional layer of abstraction.Thus container technology is expected to provide near native per
APA, Harvard, Vancouver, ISO, and other styles
2

Boberić, Milan. "JEDNO OD REŠENJA ZA PARTICIONISANJE CENTRALNE PROCESORSKE JEDINICE SA VIŠE JEZGARA." Zbornik radova Fakulteta tehničkih nauka u Novom Sadu 34, no. 04 (2019): 781–84. http://dx.doi.org/10.24867/02ih07boberic.

Full text
Abstract:
U ovom radu predstavljena je imple­mentacija i optimizacija sistema za particionisanje centralne procesorske jedinice sa više jezgara. Sistem se sastoji iz UltraZed-EG ploče na kojoj je implementiran Xen Hypervisor kao sistem za particionisanje. Xen Hypervisor je virtuelni sloj koji koristi postojeći operativni sistem (host) koji mu omogućava pristup memoriji, prekidima i drugim resursima i omogućava kreiranje virtuelnih jezgara koja se po instrukcijama korisnika mogu raspoređivati na fizička jezgra. Dat je akcenat na real-time particionisanje i optimizaciju Xen Hypervisora u cilju poboljšanja
APA, Harvard, Vancouver, ISO, and other styles
3

Barrowclough, John Patrick, and Rameez Asif. "Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures." Security and Communication Networks 2018 (June 11, 2018): 1–20. http://dx.doi.org/10.1155/2018/1681908.

Full text
Abstract:
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hypervisor’ that may be attacked and user data can be compromised or hacked. In order to better define these threats to which a cloud hypervisor is exposed, we conducted an in-depth analysis and highlighted the security concerns of the cloud. We basically focused on the two particular issues, i.e., (a) data breaches and (b) weak authentication. For in-depth analysis, we have successfully demonstrated a fully functional private
APA, Harvard, Vancouver, ISO, and other styles
4

Kashyap, Rekha, and Deo Prakash Vidyarthi. "A Secured Real Time Scheduling Model for Cloud Hypervisor." International Journal of Cloud Applications and Computing 6, no. 4 (2016): 97–110. http://dx.doi.org/10.4018/ijcac.2016100106.

Full text
Abstract:
Virtualization is critical to cloud computing and is possible through hypervisors, which maps the Virtual machines((VMs) to physical resources but poses security concerns as users relinquish physical possession of their computation and data. Good amount of research is initiated for resource provisioning on hypervisors, still many issues need to be addressed for security demanding and real time VMs. First work SRT-CreditScheduler (Secured and Real-time), maximizes the success rate by dynamically prioritizing the urgency and the workload of VMs but ensures highest security for all. Another work,
APA, Harvard, Vancouver, ISO, and other styles
5

Perneel, L., H. Fayyad-Kazan, L. Peng, F. Guan, and M. Timmerman. "Business Hypervisors for Real-time Applications." Engineering, Technology & Applied Science Research 5, no. 4 (2015): 832–40. http://dx.doi.org/10.48084/etasr.568.

Full text
Abstract:
System virtualization is one of the hottest trends in information technology today. It is not just another nice to use technology but has become fundamental across the business world. It is successfully used with many business application classes where cloud computing is the most visual one. Recently, it started to be used for soft Real-Time (RT) applications such as IP telephony, media servers, audio and video streaming servers, automotive and communication systems in general. Running these applications on a traditional system (Hardware + Operating System) guarantee their Quality of Service (
APA, Harvard, Vancouver, ISO, and other styles
6

Zoughbi, Dina Mohsen, and Nitul Dutta. "Hypervisor Vulnerabilities and Some Defense Mechanisms, in Cloud Computing Environment." International Journal of Innovative Technology and Exploring Engineering 10, no. 2 (2020): 42–48. http://dx.doi.org/10.35940/ijitee.b8262.1210220.

Full text
Abstract:
Cloud computing is the most important technology at the present time, in terms of reducing applications costs and makes them more scalable and flexible. As the cloud currency is based on building virtualization technology, so it can secure a large-scale environment with limited security capacity such as the cloud. Where, Malicious activities lead the attackers to penetrate virtualization technologies that endanger the infrastructure, and then enabling attacker access to other virtual machines which running on the same vulnerable device. The proposed work in this paper is to review and discuss
APA, Harvard, Vancouver, ISO, and other styles
7

Rong Chang, Bao, Hsiu-Fen Tsai, Chi-Ming Chen, and Chien-Feng Huang. "Analysis of virtualized cloud server together with shared storage and estimation of consolidation ratio and TCO/ROI." Engineering Computations 31, no. 8 (2014): 1746–60. http://dx.doi.org/10.1108/ec-11-2012-0295.

Full text
Abstract:
Purpose – The physical server transition to virtualized infrastructure server have encountered crucial problems such as server consolidation, virtual machine (VM) performance, workload density, total cost of ownership (TCO), and return on investments (ROIs). In order to solve the problems mentioned above, the purpose of this paper is to perform the analysis of virtualized cloud server together with shared storage as well as the estimation of consolidation ratio and TCO/ROI in server virtualization. Design/methodology/approach – This paper introduces five distinct virtualized cloud computing se
APA, Harvard, Vancouver, ISO, and other styles
8

Ahuja, Sanjay P., and Suganya Sridharan. "Performance Evaluation of Hypervisors for Cloud Computing." International Journal of Cloud Applications and Computing 2, no. 3 (2012): 26–67. http://dx.doi.org/10.4018/ijcac.2012070102.

Full text
Abstract:
The virtualization of IT infrastructure enables consolidation and pooling of IT resources so they are shared over diverse applications to offset the limitation of shrinking resources and growing business needs. Virtualization provides a logical abstraction of physical computing resources and creates computing environments that are not restricted by physical configuration or implementation. Virtualization is very important for cloud computing because the delivery of services simplified by providing a platform for optimizing complex IT resources in a scalable manner, which makes cloud computing
APA, Harvard, Vancouver, ISO, and other styles
9

Fox, Dirk. "Hypervisor." Datenschutz und Datensicherheit - DuD 36, no. 1 (2012): 54. http://dx.doi.org/10.1007/s11623-012-0012-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Colafranceschi, Stefano, and Emanuele De Biase. "The Case for a Cost-Effective General-Purpose Computer Cluster for Small Colleges." International Journal of Emerging Technologies in Learning (iJET) 16, no. 04 (2021): 4. http://dx.doi.org/10.3991/ijet.v16i04.18837.

Full text
Abstract:
The computational capabilities of commercial CPUs and GPUs reached a plateau but soft-ware applications are usually memory-intense tasks and they commonly need/utilize most recent hardware developments. Computer clusters are an expensive solution, although reliable and versatile, with a limited market share for small colleges.
 Small schools would typically rely on cloud-based systems because they are more afford-able (less expensive), manageable (no need to worry about the maintenance), and easier to implement (the burden is shifted into the datacenter). Here we provide arguments in favo
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Hypervizor hypervisor"

1

Škultéty, Erik. "Aplikační rozhraní pro administraci projektu Libvirt." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255346.

Full text
Abstract:
Tato práce se zabývá problematikou virtualizace, konkrétně virtualizační knihovnou libvirt, cílem které je správa virtuálních strojů a podpora různých typů hypervizorů a virtualizačních řešení jednotným způsobem transparentním pro uživatele. Podstatná část funkcionality knihovny libvirt je na pozadí implementována formou démona libvirtd. Ačkoliv libvirtd démon poskytuje služby pro správu virtuálních strojů, neumožňuje správu sebe samého, kromě změn hodnot parametrů v konfiguračním souboru. Pro změnu nastavení je pak standardním přístupem změna v konfiguračním souboru a následný restart démona.
APA, Harvard, Vancouver, ISO, and other styles
2

Rybák, Martin. "Konsolidace serverů za použití virtualizace." Master's thesis, Vysoká škola ekonomická v Praze, 2007. http://www.nusl.cz/ntk/nusl-77173.

Full text
Abstract:
The thesis deals with the topic of complexity of current IT. As a result, the consolidation of servers using virtualization is the answer to permanently growing complexity of server infrastructure. The thesis summarizes the basic aspects of this issue, compares the contributions and tries to analyze problems which can emerge. Further, it points a way of consolidation journey, compares different types of virtualization and elaborates the contributions of virtualization for corporate IS/ICT and its flexibility of solution. It analyzes present state of the market with virtualization tools, descri
APA, Harvard, Vancouver, ISO, and other styles
3

Krempa, Peter. "Analysis of Entropy Levels in the Entropy Pool of Random Number Generator." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236179.

Full text
Abstract:
V informatice je pojem entropie obvykle znám jako nahodný proud dat.  Tato práce krátce shrnuje metody generovaní nahodných dat a popisuje generátor náhodnych čísel, jež je obsažen v jádře operačního systému Linux.  Dále se práce zabývá určením bitové rychlosti generování nahodných dat tímto generátorem ve virtualizovaném prosředí, které poskytují různé hypervizory.  Práce popíše problémy nízkého výkonu generátory nahodných dat ve virtualním prostředí a navrhne postup pro jejich řešení.  Poté je nastíňena implementace navržených postupů, které je podrobena testům a její vysledky jsou porovnány
APA, Harvard, Vancouver, ISO, and other styles
4

Isenstierna, Tobias, and Stefan Popovic. "Computer systems in airborne radar : Virtualization and load balancing of nodes." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18300.

Full text
Abstract:
Introduction. For hardware used in radar systems of today, technology is evolving in an increasing rate. For existing software in radar systems, relying on specific drivers or hardware, this quickly becomes a problem. When hardware required is no longer produced or outdated, compatibility problems emerges between the new hardware and existing software. This research will focus on exploring if the virtualization technology can be helpful in solving this problem. Would it be possible to address the compatibility problem with the help of hypervisor solutions, while also maintaining high performan
APA, Harvard, Vancouver, ISO, and other styles
5

Cardace, Antonio. "UMView, a Userspace Hypervisor Implementation." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13184/.

Full text
Abstract:
UMView is a partial virtual machine and userspace hypervisor capable of intercepting system calls and modifying their behavior according to the calling process' view. In order to provide flexibility and modularity UMView supports modules loadable at runtime using a plugin architecture. UMView in particular is the implementation of the View-OS concept which negates the global view assumption which is so radically established in the world of OSes and virtualization.
APA, Harvard, Vancouver, ISO, and other styles
6

Klemperer, Peter Friedrich. "Efficient Hypervisor Based Malware Detection." Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/466.

Full text
Abstract:
Recent years have seen an uptick in master boot record (MBR) based rootkits that load before the Windows operating system and subvert the operating system’s own procedures. As such, MBR rootkits are difficult to counter with operating system-based antivirus software that runs at the same privilege-level as the rookits. Hypervisors operate at a higher privilege level than the guests they manage, creating a high-ground position in the host. This high-ground position can be exploited to perform security checks on the virtual machine guests where the checking software is isolated from guest-based
APA, Harvard, Vancouver, ISO, and other styles
7

McAdams, Sean. "Virtualization Components of the Modern Hypervisor." UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/599.

Full text
Abstract:
Virtualization is the foundation on which cloud services build their business. It supports the infrastructure for the largest companies around the globe and is a key component for scaling software for the ever-growing technology industry. If companies decide to use virtualization as part of their infrastructure it is important for them to quickly and reliably have a way to choose a virtualization technology and tweak the performance of that technology to fit their intended usage. Unfortunately, while many papers exist discussing and testing the performance of various virtualization systems, mo
APA, Harvard, Vancouver, ISO, and other styles
8

Shah, Tawfiq M. "Radium: Secure Policy Engine in Hypervisor." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804971/.

Full text
Abstract:
The basis of today’s security systems is the trust and confidence that the system will behave as expected and are in a known good trusted state. The trust is built from hardware and software elements that generates a chain of trust that originates from a trusted known entity. Leveraging hardware, software and a mandatory access control policy technology is needed to create a trusted measurement environment. Employing a control layer (hypervisor or microkernel) with the ability to enforce a fine grained access control policy with hyper call granularity across multiple guest virtual domains can
APA, Harvard, Vancouver, ISO, and other styles
9

Suryanarayana, Vidya. "Impact of hypervisor cache locking on performance." Diss., Wichita State University, 2013. http://hdl.handle.net/10057/10616.

Full text
Abstract:
Server virtualization has become the modern trend in various industries. Industries are resorting to the deployment of virtualized servers in order to cut the cost of additional, expensive hardware and consolidate the servers on minimal hardware for easier management and maintenance. Virtualized servers are often seen connected to disk arrays in many industries ranging from small to medium business to large data centers. In such a setup, assuring a low latency of data access from the disk array plays an important role in improving the performance and robustness of the overall system. Caching t
APA, Harvard, Vancouver, ISO, and other styles
10

Chan, Lawrence L. "Modeling virtualized application performance from hypervisor counters." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/66404.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2011.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 61-64).<br>Managing a virtualized datacenter has grown more challenging, as each virtual machine's service level agreement (SLA) must be satisfied, when the service levels are generally inaccessible to the hypervisor. To aid in VM consolidation and service level assurance, we develop a modeling technique that generates accurate models of service level. Using only hypervisor counters as inputs, we
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Hypervizor hypervisor"

1

Chisnall, David. The definitive guide to the Xen hypervisor. Prentice Hall, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1977-, Sterling Mike, and Stewart Allen 1969-, eds. Windows server 2008 Hyper-V: Insiders guide to Microsoft's Hypervisor. Wiley Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

1977-, Sterling Mike, ed. Windows server 2008 R2 Hyper-V: Insiders guide to Microsoft's Hypervisor. Wiley, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kelbley, John. Windows server 2008 R2 Hyper-V: Insiders guide to Microsoft's Hypervisor. Wiley Technology Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xen Virtualization: A fast and practical guide to supporting multiple operating systems with the Xen Hypervisor. Packt Publishing, Limited, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Litty, Lionel. Hypervisor-based intrusion detection. 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Litty, Lionel. Hypervisor-based intrusion detection. 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Blokdyk, Gerardus. Embedded Hypervisor a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

The Definitive Guide to the Xen Hypervisor. Prentice Hall PTR, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chisnall, David. The Definitive Guide to the Xen Hypervisor. Prentice Hall, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Hypervizor hypervisor"

1

Jain, Shashank Mohan. "Hypervisors." In Linux Containers and Virtualization. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6283-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zaidenberg, Nezer Jacob, Michael Kiperberg, Raz Ben Yehuda, Roee Leon, Asaf Algawi, and Amit Resh. "Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot." In Communications in Computer and Information Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49443-8_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vasudevan, Amit. "Micro-Hypervisor Applications." In Practical Security Properties on Commodity Computing Platforms. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25049-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Graziano, Mariano, Andrea Lanzi, and Davide Balzarotti. "Hypervisor Memory Forensics." In Research in Attacks, Intrusions, and Defenses. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41284-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cohen, Ernie. "Validating the Microsoft Hypervisor." In FM 2006: Formal Methods. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11813040_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barrett/Norris, Kenneth/Stephen. "Building the Hypervisor Host." In Running Mainframe z on Distributed Platforms. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6431-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Budianto, Enrico, Richard Chow, Jonathan Ding, and Michael McCool. "Language-Based Hypervisors." In Cryptology and Network Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48965-0_52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vasudevan, Amit. "Micro-Hypervisors: What? Why?" In Practical Security Properties on Commodity Computing Platforms. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25049-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Alkassar, Eyad, Mark A. Hillebrand, Wolfgang Paul, and Elena Petrova. "Automated Verification of a Small Hypervisor." In Verified Software: Theories, Tools, Experiments. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15057-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mutch, John, and Brian Anderson. "Protecting Virtual Environments from Hypervisor Sabotage." In Preventing Good People from doing Bad Things. Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3922-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Hypervizor hypervisor"

1

Ferruzzi, Adriano José, Christian Esteve Rothenberg, and Leandro Martinez. "Análise do Comportamento de Aplicações Paralelas em Ambientes de Computação de Alto Desempenho Virtualizados." In XVIII Workshop em Clouds e Aplicações. Sociedade Brasileira de Computação, 2020. http://dx.doi.org/10.5753/wcga.2020.12444.

Full text
Abstract:
A computação em nuvem tem se tornado cada vez mais frequente em empresas e universidades, principalmente devido ao fato da nuvem computacional ser mais facilmente administrada uma vez que seu ambiente esteja devidamente configurado. Entretanto, há resistência na implantação de ambientes de computação de alto desempenho em nuvem e isso, provavelmente, está associado ao fato da nuvem precisar de um hypervisor para a administração das máquinas virtuais, resultando em uma perda de desempenho causado pela camada de virtualização. Por outro lado, as tecnologias de virtualização estão em constante av
APA, Harvard, Vancouver, ISO, and other styles
2

"Extending Hypervisor Architecture to Allow One Way Data Transfers from VMs to Hypervisors." In 4th International Conference on Cloud Computing and Services Science. SCITEPRESS - Science and and Technology Publications, 2014. http://dx.doi.org/10.5220/0004958006040609.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sartakov, Vasily A., and Rudiger Kapitza. "NV-Hypervisor: Hypervisor-Based Persistence for Virtual Machines." In 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2014. http://dx.doi.org/10.1109/dsn.2014.64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

VanderLeest, Steven H. "ARINC 653 hypervisor." In 2010 IEEE/AIAA 29th Digital Avionics Systems Conference (DASC). IEEE, 2010. http://dx.doi.org/10.1109/dasc.2010.5655298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Naughton, Thomas, Geoffroy Vallee, Stephen L. Scott, and Ferrol Aderholdt. "Loadable Hypervisor Modules." In 2010 43rd Hawaii International Conference on System Sciences. IEEE, 2010. http://dx.doi.org/10.1109/hicss.2010.258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dubrulle, P., R. Sirdey, P. Dore, M. Aichouch, and E. Ohayon. "Blind hypervision to protect virtual machine privacy against hypervisor escape vulnerabilities." In 2015 IEEE 13th International Conference on Industrial Informatics (INDIN). IEEE, 2015. http://dx.doi.org/10.1109/indin.2015.7281938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gantet, Anais. "CrashOS: Hypervisor Testing Tool." In 2017 IEEE 28th International Symposium on Software Reliability Engineering: Workshops (ISSREW). IEEE, 2017. http://dx.doi.org/10.1109/issrew.2017.34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thongthua, Ammarit, and Sudsanguan Ngamsuriyaroj. "Assessment of Hypervisor Vulnerabilities." In 2016 International Conference on Cloud Computing Research and Innovations (ICCCRI). IEEE, 2016. http://dx.doi.org/10.1109/icccri.2016.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Omote, Yushi, Yosuke Chubachi, Takahiro Shinagawa, Tomohiro Kitamura, Hideki Eiraku, and Katsuya Matsubara. "Hypervisor-based background encryption." In the 27th Annual ACM Symposium. ACM Press, 2012. http://dx.doi.org/10.1145/2245276.2232073.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bressoud, T. C., and F. B. Schneider. "Hypervisor-based fault tolerance." In the fifteenth ACM symposium. ACM Press, 1995. http://dx.doi.org/10.1145/224056.224058.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Hypervizor hypervisor"

1

Chandramouli, Ramaswamy. Security recommendations for hypervisor deployment on servers. National Institute of Standards and Technology, 2018. http://dx.doi.org/10.6028/nist.sp.800-125a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chandramouli, Ramaswamy. Security recommendations for server-based hypervisor platforms. National Institute of Standards and Technology, 2018. http://dx.doi.org/10.6028/nist.sp.800-125ar1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mitchum, Terrence, Kent Larson, Raymond Lu, Brian Loe, and Dick O'Brien. Hypervisors for Security and Robustness. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada360460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vasudevan, Amit, Jonathan M. McCune, and James Newsome. It's an app. It's a hypervisor. It's a hypapp. : Design and Implementation of an eXtensible and Modular Hypervisor Framework. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada579935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chandramouli, Ramaswamy, Anoop Singhal, Duminda Wijesekera, and Changwei Liu. Methodology for enabling forensic analysis using hypervisor vulnerabilities data. National Institute of Standards and Technology, 2019. http://dx.doi.org/10.6028/nist.ir.8221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chaki, Sagar, Amit Vasudevan, Limin Jia, Jonathan McCune, and Anupam Datta. Design, Development, and Automated Verification of an Integrity-Protected Hypervisor. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada579386.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Asai, H., M. MacFaden, J. Schoenwaelder, K. Shima, and T. Tsou. Management Information Base for Virtual Machines Controlled by a Hypervisor. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7666.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zaharia, Matei, Sachin Katti, Chris Grier, et al. Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada555877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!