VM2: Automated security configuration and testing of virtual machine images.
Maria SpichkovaBiao LiLachlan PorterLuke MasonYe LyuYi WengPublished in: KES (2020)
Keyphrases
- virtual machine
- operating system
- java card
- cloud computing environment
- remote attestation
- input image
- image features
- data center
- distributed computing
- image analysis
- image database
- three dimensional
- image data
- image classification
- object recognition
- image registration
- computing resources
- real time
- image retrieval
- windows xp
- databases
- edge detection
- data streams
- cloud computing
- computer systems
- computer security
- programming language
- virtual memory
- data analysis
- network access
- data mining
- multi tasking