A taxonomy and survey of cloud resource orchestration techniques
Cloud services and applications prove indispensable amid today's modern utility-based
computing. The cloud has displayed a disruptive and growing impact on everyday …
computing. The cloud has displayed a disruptive and growing impact on everyday …
Cloud computing security: A survey of service-based models
Cloud computing has recently attracted significant attention due to its economical and high-
quality services. In the last decade, cloud services have inevitably entangled with …
quality services. In the last decade, cloud services have inevitably entangled with …
Operating systems and hypervisors for network functions: A survey of enabling technologies and research studies
Scalable and flexible communication networks increasingly conduct the packet processing
for Network Functions (NFs) in General Purpose Computing (GPC) platforms. The …
for Network Functions (NFs) in General Purpose Computing (GPC) platforms. The …
A survey on automated dynamic malware analysis evasion and counter-evasion: Pc, mobile, and web
Automated dynamic malware analysis systems are important in combating the proliferation
of modern malware. Unfortunately, malware can often easily detect and evade these …
of modern malware. Unfortunately, malware can often easily detect and evade these …
[PDF][PDF] The cyber security body of knowledge
D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …
The project would like organisations using, or intending to use, CyBOK for the purposes of …
vSGX: virtualizing SGX enclaves on AMD SEV
The growing need of trusted execution environment (TEE) has boomed the development of
hardware enclaves. However, current TEEs and their applications are tightly bound to the …
hardware enclaves. However, current TEEs and their applications are tightly bound to the …
A three-way decision making approach to malware analysis using probabilistic rough sets
Malware analysis aims to identify malware by examining applications behaviour on the host
operating system. A common issue in malware analysis is how to mitigate and handle the …
operating system. A common issue in malware analysis is how to mitigate and handle the …
Rusty: Runtime interference-aware predictive monitoring for modern multi-tenant systems
Modern micro-service and container-based cloud-native applications have leveraged multi-
tenancy as a first class system design concern. The increasing number of co-located …
tenancy as a first class system design concern. The increasing number of co-located …
A survey of malware behavior description and analysis
B Yu, Y Fang, Q Yang, Y Tang, L Liu - Frontiers of Information Technology …, 2018 - Springer
Behavior-based malware analysis is an important technique for automatically analyzing and
detecting malware, and it has received considerable attention from both academic and …
detecting malware, and it has received considerable attention from both academic and …
Deploying Secure Distributed Systems: Comparative Analysis of GNS3 and SEED Internet Emulator
Network emulation offers a flexible solution for network deployment and operations,
leveraging software to consolidate all nodes in a topology and utilizing the resources of a …
leveraging software to consolidate all nodes in a topology and utilizing the resources of a …