Cyexec*: A high-performance container-based cyber range with scenario randomization

R Nakata, A Otsuka - IEEE Access, 2021 - ieeexplore.ieee.org
With increasing threats to information security, information security education through
practical exercises specifically cyber range has attracted attention. However, the use of a …

The biomedical data collecting system

P Blazek, J Krenek, K Kuca, O Krejcar… - 2015 25th International …, 2015 - ieeexplore.ieee.org
Digital records offer a solution for reducing the amount of stored paper-based records.
However, the spread of digital devices in the last decade has introduced into medicine a …

The system of instant access to the life biomedical data

P Blazek, J Krenek, K Kuca, D Jun… - 2014 IEEE 15th …, 2014 - ieeexplore.ieee.org
Digital records bring generally a solution how to reduce amount of stored paper-based
records but spread of digital devices in the last decade brings to medicine another huge …

Enhanced OpenStack cloud for network function virtualization

MH Tsai, HT Liang, YH Wang… - 2020 International …, 2020 - ieeexplore.ieee.org
The expense of telecommunications infrastructure has always been a heavy burden for
telecom operators. With the network function virtualization, network functions on the …

A study of open source web servers in virtual computing technology

V Lozupone - 2018 - search.proquest.com
This study focused on comparing performance with Apache running on Ubuntu compared
with a bare-metal server based on the theoretical framework queuing theory model. The …

[PDF][PDF] シナリオランダム化を備えた高性能コンテナ型サイバーレンジの研究

中田亮太郎 - (No Title), 2021 - lab.iisec.ac.jp
ICT 技術の発展やインターネットの普及に伴い, サイバー攻撃の脅威が増加している. それに伴い,
国や自治体・企業活動のみならず, 一般の方々の生活に直結する脅威やリスクも増加しており …

Virtualization tools analysis mapped into RING 0

J Horalek, O Marik, S Neradova… - 2014 IEEE 12th IEEE …, 2014 - ieeexplore.ieee.org
Virtualization tools analysis mapped into RING 0 Page 1 Virtualization tools analysis
mapped into RING 0 Josef Horalek, Ondrej Marik, Sona Neradova, Stanislav Zitta University …

Tietoturvariskit ja niiden hallinta BYOD-ympäristössä

M Neero - 2020 - jyx.jyu.fi
Informaatioteknologian kuluttajistuminen on synnyttänyt ilmiön, jossa työntekijät käyttävät
omia mobiililaitteitaan työntekoon, ajasta ja paikasta riippumatta. Tätä ilmiötä kutsutaan …

Cloud solutions in education

J Horalek, O Marik, S Neradova… - 2014 IEEE 12th IEEE …, 2014 - ieeexplore.ieee.org
These This paper describes the cloud solutions and its possible use in education. First part
is devoted to introduction in to the cloud technologies and terms used in this area. Second …

Leveraging virtualization and cloud computing techniques for the next generation mobile communication networks

T Ngwenya - 2015 - search.proquest.com
The research proposes an end-to-end standardized approach called the Clone Evaluation
and Implementation Mechanism, CEIM, for evaluating a smartphone existing in both the …