Deep note: Can acoustic interference damage the availability of hard disk storage in underwater data centers?

J Sheldon, W Zhu, A Abdullah, K Butler… - Proceedings of the 15th …, 2023 - dl.acm.org
The growing worldwide attention toward large-scale subsea data centers has garnered
substantial interest from commercial entities which have built and deployed underwater …

[PDF][PDF] Securing Hypervisors in Cloud Computing Environments against Malware Injection

MA Qurashi - Indian Journal of Science and …, 2023 - sciresol.s3.us-east-2.amazonaws …
Objectives: The primary objectives of this research are to address the security concerns
related to cloud computing, emphasising attacks that target different hypervisor layers. The …

[PDF][PDF] An evaluation methodology for virtual network embeddING

A Fischer - 2017 - opus4.kobv.de
The increasing scale and complexity of computer networks imposes a need for highly
flexible management mechanisms. The concept of network virtualization promises to provide …

Furnace: Self-service tenant vmi for the cloud

M Bushouse, D Reeves - Research in Attacks, Intrusions, and Defenses …, 2018 - Springer
Abstract Although Virtual Machine Introspection (VMI) tools are increasingly capable,
modern multi-tenant cloud providers are hesitant to expose the sensitive hypervisor APIs …

Tackling the cloud adoption dilemma-A user centric concept to control cloud migration processes by using machine learning technologies

M Diener, L Blessing, N Rappel - 2016 11th International …, 2016 - ieeexplore.ieee.org
Research studies have shown that especially enterprises in European countries are afraid of
losing outsourced data or unauthorized access. Despite various existing cloud security …

Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach

NO Ogwara, K Petrova, ML Yang… - Advances in Security …, 2021 - Springer
This chapter reviews existing Intrusion Detection Systems (IDS) that target the Mobile Cloud
Computing (MCC), Cloud Computing (CC), and Mobile Device (MD) environment. The …

A rule based probabilistic technique for malware code detection

S Chakraborty, L Dey - Multiagent and Grid Systems, 2016 - content.iospress.com
Security is one of the major concerns in generic computing system which is used in our day
to day life to deal with various aspects like education, banking, communication …

A Market-Based Approach for Detecting Malware in the Cloud via Introspection

N Alruhaily, C Mera-Gómez, T Chothia… - … Oriented Computing: 15th …, 2017 - Springer
Traditional anti-virus (AV) solutions are known for their considerable consumption of
resources, limiting their usefulness on the cloud. In contrast, cloud-based lightweight …