W Qiang, G Xu, W Dai, D Zou, H Jin - IEEE Access, 2017 - ieeexplore.ieee.org
IoT generates considerable amounts of data, which often requires leveraging cloud computing to effectively scale the costs of transferring and computing these data. The …
MAA Kumara, CD Jaidhar - 2015 international conference on …, 2015 - ieeexplore.ieee.org
Virtual Machines are prime target for adversary to take control by exploiting the identified vulnerability present in it. Due to increasing number of Advanced Persistent Attacks such as …
Currently, cloud computing technology is implemented by many industries in the world. This technology is very promising due to many companies only need to provide relatively smaller …
Effectively protecting the Windows TM OS is a challenging task, since most implementation details are not publicly known. Windows OS has always been the main target of malware …
W Qiang, G Xu, G Sun, T Zhu… - 2017 IEEE Trustcom …, 2017 - ieeexplore.ieee.org
Virtual machine introspection (VMI) is a critical functionality for cloud management because of the capability of security monitoring. Recently, a concept of writable VMI was proposed to …
C Wang, N Min-Allah, B Guan, YQ Lin, JZ Wu… - Journal of Computer …, 2019 - Springer
Covert channels have been an effective means for leaking confidential information across security domains and numerous studies are available on typical covert channels attacks and …
Effectively protecting the Windows OS is a challenging task, since most implementation details are not publicly known. Windows has always been the main target of malwares that …
A adoção de princípios de segurança em sistemas computacionais de nuvem é uma demanda crescente para diversas instituições, incluindo empresas e mesmo agências …
Cette thèse présente deux contributions. La première contribution consiste en l'étude des métriques de performance permettant de superviser l'activité des serveurs physiques et des …