The deployment of new security technologies in existing network topologies requires exhaustive testing before usage to avoid down time of the production systems. Nowadays, the required testing is in many cases omitted due to the complexity of creating test cases and experimental set ups. The VISA (Virtual IT Security Architectures) project [1], funded by the German Federal Ministry of Research, aims to provide a simulation environment for semi-automated deployment of experiments based on system models. Building Virtualised Security Appliances (VSA) for enterprise networks is the most important part of the VISA project, which offers the user the possibility to build and deploy secured virtual machines and services within the model to improve...
Virtualization is widely used in traditional ICT in order to share hardware resources between separa...
ii Virtualization is one of the most widely used technologies in modern day information technology d...
Nowadays, there are more sources of cyber-threats and more cyber-attacks that target all kind of vic...
The deployment of new security technologies in existing network topologies requires exhaustive testi...
The article presents the design of a model environment for penetration testing of an organization us...
Due to increased security awareness of enterprises for mobile applications operating with sensitive ...
Security by virtualization in mobile devices is more and more relevant after the recent issues revea...
We report in this paper on research in progress related to network functions virtualization (NFV) an...
Diese Arbeit beschäftigt sich mit der Erstellung eines Konzepts zum Thema Virtualisierung von Anwend...
The Virtual Secretary project focuses on the construction of an environment for secure software agen...
Information security laboratories, composed mainly of isolated physical networks, are the most effec...
The 2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7-11 June 2020The m...
The growth of the Internet has deeply influenced our daily lives as well as our commercial structure...
The rapidly growing amount of malicious software (such as worms) on the Internet causes significant...
Abstract The mobile service platform envisaged by emerging IoT and 5G is guaranteeing gigabit-level...
Virtualization is widely used in traditional ICT in order to share hardware resources between separa...
ii Virtualization is one of the most widely used technologies in modern day information technology d...
Nowadays, there are more sources of cyber-threats and more cyber-attacks that target all kind of vic...
The deployment of new security technologies in existing network topologies requires exhaustive testi...
The article presents the design of a model environment for penetration testing of an organization us...
Due to increased security awareness of enterprises for mobile applications operating with sensitive ...
Security by virtualization in mobile devices is more and more relevant after the recent issues revea...
We report in this paper on research in progress related to network functions virtualization (NFV) an...
Diese Arbeit beschäftigt sich mit der Erstellung eines Konzepts zum Thema Virtualisierung von Anwend...
The Virtual Secretary project focuses on the construction of an environment for secure software agen...
Information security laboratories, composed mainly of isolated physical networks, are the most effec...
The 2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7-11 June 2020The m...
The growth of the Internet has deeply influenced our daily lives as well as our commercial structure...
The rapidly growing amount of malicious software (such as worms) on the Internet causes significant...
Abstract The mobile service platform envisaged by emerging IoT and 5G is guaranteeing gigabit-level...
Virtualization is widely used in traditional ICT in order to share hardware resources between separa...
ii Virtualization is one of the most widely used technologies in modern day information technology d...
Nowadays, there are more sources of cyber-threats and more cyber-attacks that target all kind of vic...