Exploring container virtualization in IoT clouds
The advent of both Cloud computing and Internet of Things (IoT) is changing the way of
conceiving information and communication systems. Generally, we talk about IoT Cloud to …
conceiving information and communication systems. Generally, we talk about IoT Cloud to …
Enabling an anatomic view to investigate honeypot systems: A survey
A honeypot is a type of security facility deliberately created to be probed, attacked, and
compromised. It is often used for protecting production systems by detecting and deflecting …
compromised. It is often used for protecting production systems by detecting and deflecting …
Is container-based technology a winner for high performance scientific applications?
High Performance Computing (HPC) applications require systems with environments for
maximum use of limited resources to facilitate efficient computations. However, these …
maximum use of limited resources to facilitate efficient computations. However, these …
Dynamic scalability model for containerized cloud services
Cloud computing has become an important research area in large-scale computing systems
and is being employed by many organizations in government, businesses, and industry …
and is being employed by many organizations in government, businesses, and industry …
A study on container virtualization for guarantee quality of service in cloud-of-things
Abstract Internet of Things (IoT) Cloud is emerging as an innovative distributed system
consisting of a set of Single Board Computers (SBCs), smart phones and any other kind of …
consisting of a set of Single Board Computers (SBCs), smart phones and any other kind of …
Versatile virtual honeynet management framework
Honeypots are designed to investigate malicious behaviour. Each type of homogeneous
honeypot system has its own characteristics in respect of specific security functionality, and …
honeypot system has its own characteristics in respect of specific security functionality, and …
Application Layer Cyber Deception without Developer Interaction
Cyber deception techniques that are tightly intertwined with applications pose significant
technical challenges in production systems. Security measures are usually the responsibility …
technical challenges in production systems. Security measures are usually the responsibility …
Automated honeynet deployment strategy for active defense in container-based cloud
T Kong, L Wang, D Ma, Z Xu, Q Yang… - 2020 IEEE 22nd …, 2020 - ieeexplore.ieee.org
Lightweight virtualization represented by container technology has made continuous
progress in the field of virtualization as an effective substitute for Virtual Machine (VM) …
progress in the field of virtualization as an effective substitute for Virtual Machine (VM) …
Qos and performance metrics for container-based virtualization in cloud environments
Current cloud deployments heavily depend on hypervisor-based virtualizations. The
overarching characteristics of Docker and containerization have given them a momentum in …
overarching characteristics of Docker and containerization have given them a momentum in …
Adaptive and flexible virtual honeynet
Honeypots have been largely employed to help securing computer systems and capture
malicious activities. At present, virtual honeynets-network scenarios made of virtual …
malicious activities. At present, virtual honeynets-network scenarios made of virtual …