Timing channel in IaaS: How to identify and investigate

X Fu, R Yang, X Du, B Luo, M Guizani - IEEE Access, 2018 - ieeexplore.ieee.org
Recently, the Infrastructure as a Service Cloud (IaaS)(eg, Amazon EC2) has been widely
used by many organizations. However, some IaaS security issues create serious threats to …

[图书][B] Fusion of ECG and PPG signals in apply to spoof detection and biometric authentication

FS Mousavi - 2020 - search.proquest.com
This thesis proposes a novel spoof detection method in biometric systems upon fusing ECG
and PPG characteristics. The suggested model is constituted by two main phases: First …

MLSCPC: Multi-level security using covert channel to achieve privacy through cloud computing

TS Fatayer, KAA Timraz - 2015 World Symposium on Computer …, 2015 - ieeexplore.ieee.org
Cloud provider is central processing with shared resources to serve the vendors on demand
over the internet where, Cloud model is divided into deployment and service model. In this …

DCAV: A software system to evaluate next‐generation cloud data center availability through a friendly graphical interface

A Moreira, D Rosendo, D Gomes… - Software: Practice …, 2019 - Wiley Online Library
To assess the availability of different data center configurations, understand the main root
causes of data center failures and represent its low‐level details, such as subsystem's …