共 50 条
[41]
Dynamic Resource Provisioning in Cloud Computing Environment using Priority based Virtual Machine's
[J].
2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT),
2014,
:1777-1782
[42]
Optimal Scheduling of Computational Task in Cloud using Virtual Machine Tree
[J].
2012 THIRD INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT),
2012,
:143-146
[43]
Research on a security mechanism for cloud computing based on virtualization
[J].
Telecommunication Systems,
2013, 53
:19-24
[44]
Security as a Service Model for Virtualization Vulnerabilities in Cloud Computing
[J].
2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT),
2018,
:559-562
[45]
A Study on the Virtualization Security Management in the Cloud Computing Environment
[J].
INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3,
2013, 336-338
:2035-2039
[48]
Definition of security metrics for the Cloud Computing and security-aware virtual machine placement algorithms
[J].
2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC),
2013,
:125-131
[49]
Cross Virtual Machine Security: A Survey
[J].
DIGITAL TECHNOLOGIES AND APPLICATIONS, ICDTA 2022, VOL 1,
2022, 454
:190-199
[50]
Security Enhancement in Healthcare Cloud using Machine Learning
[J].
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017),
2018, 127
:388-397