[HTML][HTML] Deploying Secure Distributed Systems: Comparative Analysis of GNS3 and SEED Internet Emulator

L Golightly, P Modesti, V Chang - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Network emulation offers a flexible solution for network deployment and operations,
leveraging software to consolidate all nodes in a topology and utilizing the resources of a …

A taxonomy of virtualization security issues in cloud computing environments

NM Almutairy, KHA Al-Shqeerat… - Indian Journal of Science …, 2019 - ssoar.info
Objectives: To identify the main challenges and security issues of virtualization in cloud
computing environments. It reviews the alleviation techniques for improving the security of …

[PDF][PDF] Virtual machine escape in cloud computing services

H Abusaimeh - International Journal of Advanced Computer Science …, 2020 - academia.edu
It's of axioms; every progress that is devised in the field of facilitating daily life through
technology is matched by many complications in terms of the methods that led to the …

Machine learning-based anomalies detection in cloud virtual machine resource usage

P Ntambu, SA Adeshina - 2021 1st International Conference on …, 2021 - ieeexplore.ieee.org
Cloud computing is one of the greatest innovations and emerging technologies of the
century. It incorporates networks, databases, operating systems, and virtualization …

Real-time detection method for mobile network traffic anomalies considering user behavior security monitoring

Z Huabing, Y Sisi, C Xiaoming… - … Conference on Computer …, 2021 - ieeexplore.ieee.org
The traditional network traffic anomaly detection method is based on the principle of feature
extraction and matching for a large amount of abnormal traffic data to achieve traffic anomaly …

[PDF][PDF] SECURE AND ISOLATED COMPUTING IN VIRTUALIZATION AND CLOUD ENVIRONMENTS: A SYSTEMATIC REVIEW OF EMERGING TRENDS AND …

LL Scientific - Journal of Theoretical and Applied Information …, 2024 - researchgate.net
In an era defined by the omnipresence of virtualization and the increasing dependence on
cloud computing, ensuring efficient and secure virtual machine management is of …

Exploring Defense Federal Acquisition Regulations Supplement (Dfars) Compliance Strategies in Cloud Computing: A Case Study

SN Tevaseu - 2020 - search.proquest.com
As the information technology (IT) landscape continues to evolve and mature, governance
and compliance requirements of IT controls constantly challenge corporations in various …

A noble approach toward security implementation in cloud virtualization framework

T Mukherjee, S Sahana, D Sarddar - Proceedings of the 2nd International …, 2020 - Springer
Virtual machine infrastructure has been one of the most powerful technologies over the
years. In the mid of its growing popularity in the market, there lies a fear in using this …

Unusual Behavior Analysis of Virtual Machine in Cloud Environment

S Nivetha, M Saravanan, V Lavanya - Artificial Intelligence Techniques for …, 2021 - Springer
Cloud computing is a model for enabling the resources to access over the internet, rather
than managing files on local storage. Virtual machine is the abstraction of hardware of a …