Exploring container virtualization in IoT clouds

A Celesti, D Mulfari, M Fazio, M Villari… - … conference on Smart …, 2016 - ieeexplore.ieee.org
The advent of both Cloud computing and Internet of Things (IoT) is changing the way of
conceiving information and communication systems. Generally, we talk about IoT Cloud to …

Enabling an anatomic view to investigate honeypot systems: A survey

W Fan, Z Du, D Fernández, VA Villagra - IEEE Systems Journal, 2017 - ieeexplore.ieee.org
A honeypot is a type of security facility deliberately created to be probed, attacked, and
compromised. It is often used for protecting production systems by detecting and deflecting …

Is container-based technology a winner for high performance scientific applications?

T Adufu, J Choi, Y Kim - 2015 17th Asia-Pacific Network …, 2015 - ieeexplore.ieee.org
High Performance Computing (HPC) applications require systems with environments for
maximum use of limited resources to facilitate efficient computations. However, these …

Dynamic scalability model for containerized cloud services

S El Kafhali, I El Mir, K Salah, M Hanini - Arabian Journal for Science and …, 2020 - Springer
Cloud computing has become an important research area in large-scale computing systems
and is being employed by many organizations in government, businesses, and industry …

A study on container virtualization for guarantee quality of service in cloud-of-things

A Celesti, D Mulfari, A Galletta, M Fazio… - Future Generation …, 2019 - Elsevier
Abstract Internet of Things (IoT) Cloud is emerging as an innovative distributed system
consisting of a set of Single Board Computers (SBCs), smart phones and any other kind of …

Versatile virtual honeynet management framework

W Fan, D Fernández, Z Du - IET Information Security, 2017 - Wiley Online Library
Honeypots are designed to investigate malicious behaviour. Each type of homogeneous
honeypot system has its own characteristics in respect of specific security functionality, and …

Application Layer Cyber Deception without Developer Interaction

M Kahlhofer, S Rass - arxiv preprint arxiv:2405.12852, 2024 - arxiv.org
Cyber deception techniques that are tightly intertwined with applications pose significant
technical challenges in production systems. Security measures are usually the responsibility …

Automated honeynet deployment strategy for active defense in container-based cloud

T Kong, L Wang, D Ma, Z Xu, Q Yang… - 2020 IEEE 22nd …, 2020 - ieeexplore.ieee.org
Lightweight virtualization represented by container technology has made continuous
progress in the field of virtualization as an effective substitute for Virtual Machine (VM) …

Qos and performance metrics for container-based virtualization in cloud environments

IMA Jawarneh, P Bellavista, L Foschini… - Proceedings of the 20th …, 2019 - dl.acm.org
Current cloud deployments heavily depend on hypervisor-based virtualizations. The
overarching characteristics of Docker and containerization have given them a momentum in …

Adaptive and flexible virtual honeynet

W Fan, D Fernández, Z Du - … Conference, MSPN 2015, Paris, France, June …, 2015 - Springer
Honeypots have been largely employed to help securing computer systems and capture
malicious activities. At present, virtual honeynets-network scenarios made of virtual …