A taxonomy and survey of cloud resource orchestration techniques

D Weerasiri, MC Barukh, B Benatallah… - ACM Computing …, 2017 - dl.acm.org
Cloud services and applications prove indispensable amid today's modern utility-based
computing. The cloud has displayed a disruptive and growing impact on everyday …

Cloud computing security: A survey of service-based models

FK Parast, C Sindhav, S Nikam, HI Yekta, KB Kent… - Computers & …, 2022 - Elsevier
Cloud computing has recently attracted significant attention due to its economical and high-
quality services. In the last decade, cloud services have inevitably entangled with …

Operating systems and hypervisors for network functions: A survey of enabling technologies and research studies

AS Thyagaturu, P Shantharama, A Nasrallah… - IEEE …, 2022 - ieeexplore.ieee.org
Scalable and flexible communication networks increasingly conduct the packet processing
for Network Functions (NFs) in General Purpose Computing (GPC) platforms. The …

A survey on automated dynamic malware analysis evasion and counter-evasion: Pc, mobile, and web

A Bulazel, B Yener - Proceedings of the 1st Reversing and Offensive …, 2017 - dl.acm.org
Automated dynamic malware analysis systems are important in combating the proliferation
of modern malware. Unfortunately, malware can often easily detect and evade these …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

vSGX: virtualizing SGX enclaves on AMD SEV

S Zhao, M Li, Y Zhangyz, Z Lin - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
The growing need of trusted execution environment (TEE) has boomed the development of
hardware enclaves. However, current TEEs and their applications are tightly bound to the …

A three-way decision making approach to malware analysis using probabilistic rough sets

M Nauman, N Azam, JT Yao - Information Sciences, 2016 - Elsevier
Malware analysis aims to identify malware by examining applications behaviour on the host
operating system. A common issue in malware analysis is how to mitigate and handle the …

Rusty: Runtime interference-aware predictive monitoring for modern multi-tenant systems

D Masouros, S Xydis, D Soudris - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Modern micro-service and container-based cloud-native applications have leveraged multi-
tenancy as a first class system design concern. The increasing number of co-located …

A survey of malware behavior description and analysis

B Yu, Y Fang, Q Yang, Y Tang, L Liu - Frontiers of Information Technology …, 2018 - Springer
Behavior-based malware analysis is an important technique for automatically analyzing and
detecting malware, and it has received considerable attention from both academic and …

Deploying Secure Distributed Systems: Comparative Analysis of GNS3 and SEED Internet Emulator

L Golightly, P Modesti, V Chang - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Network emulation offers a flexible solution for network deployment and operations,
leveraging software to consolidate all nodes in a topology and utilizing the resources of a …