Combining containers and virtual machines to enhance isolation and extend functionality on cloud computing

I Mavridis, H Karatza - Future Generation Computer Systems, 2019 - Elsevier
Virtualization technology is the underlying element of cloud computing. Traditionally, cloud
computing has employed virtual machines to distribute available resources and provide …

Cyberattacks and security of cloud computing: a complete guideline

M Dawood, S Tu, C Xiao, H Alasmary, M Waqas… - Symmetry, 2023 - mdpi.com
Cloud computing is an innovative technique that offers shared resources for stock cache and
server management. Cloud computing saves time and monitoring costs for any organization …

[HTML][HTML] Testing the limits of general-purpose hypervisors for real-time control systems

R Queiroz, T Cruz, P Simões - Microprocessors and Microsystems, 2023 - Elsevier
With the emergence of the Industry 4.0 paradigm, there is a need to introduce a significant
degree of flexibility, security and resilience in automation infrastructures, while keeping up …

Efficient resource management techniques in cloud computing environment: Review and discussion

F Nzanywayingoma, Y Yang - Telkomnika, 2017 - search.proquest.com
The increasing number of cloud computing infrastructure and of the users' demands for
services has made the resource management an impossible task to be manually performed …

Leveraging a cloud-native architecture to enable semantic interconnectedness of data for cyber threat intelligence

M Ammi, O Adedugbe, FM Alharby, E Benkhelifa - Cluster Computing, 2022 - Springer
Cloud technologies have several merits including the elimination of cost incurred when
traditional technologies are adopted. Despite the benefits, the cloud is still facing security …

[PDF][PDF] On the review and setup of security audit using Kali Linux

TS Gunawan, MK Lim, NF Zulkurnain… - Indonesian Journal of …, 2018 - researchgate.net
The massive development of technology especially in computers, mobile devices, and
networking has bring security issue forward as primarily concern. The computers and mobile …

Dependability analysis for characterizing Google cluster reliability

MR Mesbahi, AM Rahmani… - International Journal of …, 2019 - Wiley Online Library
Cloud solutions are emerging as a new suitable way of transforming traditional IT data
centers to highly available and reliable computing resources for hosting critical applications …

[PDF][PDF] Automation conditions of mobile base station shelter via cloud and IoT computing applications.

AH Shatti, HA Hasson… - International Journal of …, 2021 - academia.edu
In this paper, a monitoring and controlling process of the mobile base station shelter has
been implemented. We have proposed a model that is based on a firebase cloud service …

[PDF][PDF] Security Challenges of Virtualization in Cloud Environment

HM Anitha, P Jayarekha - International Journal of …, 2018 - pdfs.semanticscholar.org
Revised 12/Jan/2018, Accepted 28/Jan/2018, Online 28/Feb/2018 Abstract—Cloud
computing is the latest technology used by different category of users. Cloud computing …

Application of server virtualization technology in power information construction

H Yu, J Guo, L Wu, S Wu, B Peng - Journal of Physics …, 2021 - iopscience.iop.org
In recent years, with the development of our country, higher requirements are put forward for
the power supply. Electric power enterprises want to improve their comprehensive strength …