Virtual machines - an idea whose time has returned: application to network, security, and database courses.
William I. Bullers Jr.Stephen D. BurdAlessandro F. SeazzuPublished in: SIGCSE (2006)
Keyphrases
- network security
- database
- virtual machine
- intrusion detection
- computer networks
- intrusion detection system
- multi tasking
- databases
- information security
- computing resources
- database systems
- risk assessment
- anomaly detection
- network access
- traffic analysis
- ip networks
- real time
- dimensionality reduction
- security policies
- database management
- data streams
- data model
- quality of service
- low cost
- database management systems