Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Randomized MILP framework for Securing Virtual Machines from Malware Attacks

    R. Mangalagowri1,*, Revathi Venkataraman2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1565-1580, 2023, DOI:10.32604/iasc.2023.026360

    Abstract Cloud computing involves remote server deployments with public network infrastructures that allow clients to access computational resources. Virtual Machines (VMs) are supplied on requests and launched without interactions from service providers. Intruders can target these servers and establish malicious connections on VMs for carrying out attacks on other clustered VMs. The existing system has issues with execution time and false-positive rates. Hence, the overall system performance is degraded considerably. The proposed approach is designed to eliminate Cross-VM side attacks and VM escape and hide the server’s position so that the opponent cannot track the target server beyond a certain point.… More >

  • Open Access

    ARTICLE

    Ensuring Readability of Electronic Records Based on Virtualization Technology in Cloud Storage

    Qirun Wang1,2, Fujian Zhu3,4, Yan Leng3,4, Yongjun Ren3,4,*, Jinyue Xia5

    Journal on Internet of Things, Vol.1, No.1, pp. 33-39, 2019, DOI:10.32604/jiot.2019.05898

    Abstract With the rapid development of E-commerce and E-government, there are so many electronic records have been produced. The increasing number of electronic records brings about storage difficulties, the traditional electronic records center is difficult to cope with the current fast growth requirements of electronic records storage and management. Therefore, it is imperative to use cloud storage technology to build electronic record centers. However, electronic records also have weaknesses in the cloud storage environment, and one of them is that once electronic record owners or managers lose physical control of them, the electronic records are more likely to be tampered with… More >

Displaying 1-10 on page 1 of 2. Per Page