Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Insider threat mitigation: Systematic literature review
The increasing prevalence of cybercrime necessitates the implementation of robust security
measures. The majority of these attacks are initiated by authorized users who possess …
measures. The majority of these attacks are initiated by authorized users who possess …
Machine learning for service migration: a survey
Future communication networks are envisioned to satisfy increasingly granular and dynamic
requirements to accommodate the application and user demands. Indeed, novel immersive …
requirements to accommodate the application and user demands. Indeed, novel immersive …
Event-based moving target defense in cloud computing with vm migration: A performance modeling approach
The domain of information security is undergoing significant evolution to address the
increasingly complex challenges aimed at bolstering system resilience against attacks. The …
increasingly complex challenges aimed at bolstering system resilience against attacks. The …
Secured VM deployment in the cloud: Benchmarking the enhanced simulation model
U Nauman, Y Zhang, Z Li, T Zhen - Applied Sciences, 2024 - mdpi.com
Cloud computing has gained widespread recognition for facilitating myriad online services
and applications. However, the current stages of commercial cloud computing employ a …
and applications. However, the current stages of commercial cloud computing employ a …
[HTML][HTML] Evaluation of time-based virtual machine migration as moving target defense against host-based attacks
M Torquato, P Maciel, M Vieira - Journal of Systems and Software, 2025 - Elsevier
Abstract Moving Target Defense (MTD) consists of applying dynamic reconfiguration in the
defensive side of the attack-defense cybersecurity game. Virtual Machine (VM) migration …
defensive side of the attack-defense cybersecurity game. Virtual Machine (VM) migration …
Software rejuvenation meets moving target defense: Modeling of time-based virtual machine migration approach
The use of Virtual Machine (VM) migration as support for software rejuvenation was
introduced more than a decade ago. Since then, several works have validated this approach …
introduced more than a decade ago. Since then, several works have validated this approach …
An SRN-based model for assessing co-resident attack mitigation in cloud with VM migration and allocation policies
Cloud computing provides users with cost-effective on-demand resource sharing, but the
shared resources also creates additional security risks due to co-location with malicious …
shared resources also creates additional security risks due to co-location with malicious …
A review of methods to prevent DDOS attacks using NFV and SDN
Denial-of-service attacks are always one of the most widespread security attacks at the
enterprise network level. In DDOS attacks, a large amount of false demand is intentionally …
enterprise network level. In DDOS attacks, a large amount of false demand is intentionally …
Security modeling and analysis of moving target defense in software defined networks
The use of traditional defense mechanisms or intrusion detection systems presents a
disadvantage for defenders against attackers since these mechanisms are essentially …
disadvantage for defenders against attackers since these mechanisms are essentially …
Can Migration-based Dynamic Platform Technique Work Effectively: A Quantitative Analysis Perspective
W Zhu, Y Yang, Y Zhang, X Chang - IEEE Access, 2024 - ieeexplore.ieee.org
Migration-based Dynamic Platform (MdyPlat) is a type of Moving Target Defense (MTD)
techniques to protect the task executed on the platform. MdyPlat actively hinders …
techniques to protect the task executed on the platform. MdyPlat actively hinders …