An empirical study of architecting for continuous delivery and deployment

M Shahin, M Zahedi, MA Babar, L Zhu - Empirical Software Engineering, 2019 - Springer
Recently, many software organizations have been adopting Continuous Delivery and
Continuous Deployment (CD) practices to develop and deliver quality software more …

Confadvisor: A performance-centric configuration tuning framework for containers on kubernetes

T Chiba, R Nakazawa, H Horii… - … Conference on Cloud …, 2019 - ieeexplore.ieee.org
Configuration tuning of software is often a good option to improve application performance
without any application code modifications. Although we can casually change …

Counteracting attacks from malicious end hosts in software defined networks

V Varadharajan, U Tupakula - IEEE Transactions on Network …, 2019 - ieeexplore.ieee.org
This paper proposes security techniques for counteracting attacks from malicious end hosts
in a software defined networking (SDN) environment. This paper describes the design of a …

Blue-pill oxpecker: A VMI platform for transactional modification

SM AghamirMohammadAli, B Momeni… - … on Cloud Computing, 2021 - ieeexplore.ieee.org
Although multiple techniques have been proposed with the goal of minimizing the semantic
gap in virtual machine introspection, most concentrate on passive observation of the internal …

Towards non-intrusive software introspection and beyond

A Mohan, S Nadgowda, B Pipaliya… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
Continuous verification and security analysis of software systems are of paramount
importance to many organizations. The state-of-the-art for such operations implements agent …

KalpaVriksh: Efficient and Cost-effective GUI Application Hosting using Singleton Snapshots

S Shaikh, S Kumar, D Mishra - 2023 IEEE/ACM 23rd …, 2023 - ieeexplore.ieee.org
Hosting popular GUI applications in different virtual machines (VMs) in a cloud can provide
strong intra-application isolation and enhance the security of end-user devices. In this …

Déjàvu: bringing black-box security analytics to cloud

S Nadgowda, C Isci, M Bal - Proceedings of the 19th International …, 2018 - dl.acm.org
Emerging security solutions for cloud commonly operate in two phases, data collection and
analytics. Data collection phase provides visibility into cloud resources (images, containers …

Provisioning Strategies for Centralized Bare-Metal Clusters

A Mohan - 2021 - search.proquest.com
Technological inertia leads many organizations to continue employing static provisioning
strategies for bare-metal deployments, resulting in architectural and runtime inefficiencies …

SDN-based dynamic policy specification and enforcement for provisioning SECaaS in cloud

U Tupakula, V Varadharajan, K Karmakar - Web Information Systems …, 2017 - Springer
In this paper we make use of SDN for provisioning of Security as a Service (SECaaS) to the
tenant and simplify the security management in cloud. We have developed a Security …

[PDF][PDF] VirtAV: an Agentless Runtime Antivirus System for Virtual Machines

H Tang, S Feng, X Zhao, Y Jin - KSII Transactions on Internet and …, 2017 - koreascience.kr
Antivirus is an important issue to the security of virtual machine (VM). According to where the
antivirus system resides, the existing approaches can be categorized into three classes …