共 50 条
[31]
Classifying malware attacks in IaaS cloud environments
[J].
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS,
2017, 6
[32]
FCM: an Architecture for Integrating IaaS Cloud Systems
[J].
CLOUD COMPUTING 2011: THE SECOND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, GRIDS, AND VIRTUALIZATION,
2011,
:7-12
[33]
Misuse Detection in a Simulated IaaS Environment
[J].
EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2018,
2018, 11263
:103-115
[34]
Analysis of Frameworks for Building IaaS Cloud Using by Cloud Computing Providers
[J].
ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC-2017),
2018, 13
:655-663
[35]
A Separation Principle for Optimal IaaS Cloud Computing Distribution
[J].
2016 24TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO),
2016,
:1393-1397
[36]
Rolling Upgrade with Dynamic Batch Size for Iaas Cloud
[J].
PROCEEDINGS OF 2016 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD),
2016,
:497-504
[37]
Integrated policy management framework for IaaS Cloud middleware
[J].
Computing,
2016, 98
:471-494
[38]
On Implementation of a KVM IaaS with Monitoring System on Cloud Environments
[J].
COMMUNICATION AND NETWORKING, PT I,
2011, 265
:300-309
[40]
Efficient Deployment and Scheduling of Virtual Machines in an IaaS Cloud
[J].
INTERNATIONAL CONFERENCE ON ADVANCED EDUCATIONAL TECHNOLOGY AND INFORMATION ENGINEERING (AETIE 2015),
2015,
:464-470