Essays about: "VM"
Showing result 1 - 5 of 77 essays containing the word VM.
-
1. Towards Performance Evaluation and Future Applications of eBPF
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Extended Berkeley Packet Filter (eBPF) is an instruction set and an execution environment inside the Linux kernel. eBPF improves flexibility for data processing and is realized via a virtual machine featuring both a Just-In-Time (JIT) compiler and an interpreter running in the kernel. READ MORE
-
2. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE
-
3. Capacity Analysis of Åre Ski Resort: A Jackson Network Approach
University essay from KTH/Matematisk statistikAbstract : Åre ski resort is the largest and most renowned ski resort in Sweden, offering excellent skiing opportunities, restaurants, and nightlife in a prime location. Meanwhile, it is often subject to heavy traffic during the peak season and has earned a bad reputation for struggling with long lift queues. READ MORE
-
4. Tenant Separation on a multi-tenant microservice platform
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Axis Communications wishes to investigate their PaaS system, Axis Connected Services(ACX), with regard to separation of the tenants of the platform to ensure the implemented separation technologies are used correctly and to find out whether more separation is necessary. ACX ties together several previously separate services under a single umbrella, with the goal of improving usability and increasing inter-service functionalities and centralisation of the software products Axis has developed for their devices. READ MORE
-
5. Masking revealing hardware attributes in the source code of a hypervisor : A study exploring strategies to hide the identity of virtual environments during malware analysis
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Malware is responsible for a significant part of the ever increasing cost of cyberattacks. Malware analysis is an important part in minimizing these costs. READ MORE