Verification of Cyber Emulation Experiments Through Virtual Machine and Host Metrics.
Jamie ThorpeLaura P. SwilerSeth HansonGerardo CruzThomas D. TarmanTrevor RollinsBert J. DebusscherePublished in: CSET @ USENIX Security Symposium (2022)
Keyphrases
- virtual machine
- java card
- operating system
- data center
- distributed computing
- java bytecode
- computing resources
- model checking
- low latency
- memory management
- virtual memory
- cloud computing environment
- multi tasking
- data structure
- database
- cyber security
- machine learning
- data processing
- source code
- static analysis
- java virtual machine
- cyber crime
- data mining