Academic literature on the topic 'Cloud computing · Virtualization · Security · Privacy · Vulnerabilities'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cloud computing · Virtualization · Security · Privacy · Vulnerabilities.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cloud computing · Virtualization · Security · Privacy · Vulnerabilities"
Uddin, Mueen, Anjum Khalique, Awais Khan Jumani, Syed Sajid Ullah, and Saddam Hussain. "Next-Generation Blockchain-Enabled Virtualized Cloud Security Solutions: Review and Open Challenges." Electronics 10, no. 20 (2021): 2493. http://dx.doi.org/10.3390/electronics10202493.
Full textRenjith, E. Jeslin. "Revolutionizing Cloud Security: Innovative Approaches for Safeguarding Data Integrity." FMDB Transactions on Sustainable Computer Letters 2, no. 2 (2024): 111–19. http://dx.doi.org/10.69888/ftscl.2024.000185.
Full textPragya, Rathore, and Mishra Sachin. "5G Security Challenges & Solutions: A Comprehensive Survey." International Journal for Research Trends and Innovation 9, no. 5 (2024): 517–32. https://doi.org/10.5281/zenodo.11568989.
Full textAdi, Maheswara Reddy G. 1. Dr K. Venkata Rao2 Dr JVR Murthy3. "AN EFFECTIVE AND SECURED TECHNIQUE FOR SIDE-CHANNEL ATTACKS IN CLOUD." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 11 (2017): 226–33. https://doi.org/10.5281/zenodo.1049426.
Full textMisono, Masanori, Dimitrios Stavrakakis, Nuno Santos, and Pramod Bhatotia. "Confidential VMs Explained: An Empirical Analysis of AMD SEV-SNP and Intel TDX." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 3 (2024): 1–42. https://doi.org/10.1145/3700418.
Full textBobda, Christophe, Joel Mandebi Mbongue, Paul Chow, et al. "The Future of FPGA Acceleration in Datacenters and the Cloud." ACM Transactions on Reconfigurable Technology and Systems 15, no. 3 (2022): 1–42. http://dx.doi.org/10.1145/3506713.
Full textN, Saravanan, and Umamakeswari A. "Security Vulnerabilities of Virtualization Technique." International Journal of Engineering & Technology 7, no. 2.24 (2018): 478. http://dx.doi.org/10.14419/ijet.v7i2.24.12140.
Full textSabir Abbas and Shan-e-Zahra. "Review on Huawei Fusion Sphere Security." Lahore Garrison University Research Journal of Computer Science and Information Technology 2, no. 2 (2018): 32–37. http://dx.doi.org/10.54692/lgurjcsit.2018.020234.
Full textSabir Abbas, Shan-E- Zahra, and Noor Ul Qamar. "Review on Huawei Fusion Sphere Security." Lahore Garrison University Research Journal of Computer Science and Information Technology 1, no. 4 (2017): 58–63. https://doi.org/10.54692/lgurjcsit.2017.010415.
Full textSaugatdeep, Ranabhat, Alexey N. Nazarov, and Tuleun Terhemen Daniel. "VIRTUALIZATION SECURITY: A GATEWAY TO SECURE CLOUD COMPUTING." SYNCHROINFO JOURNAL 8, no. 6 (2022): 2–9. http://dx.doi.org/10.36724/2664-066x-2022-8-6-2-9.
Full textDissertations / Theses on the topic "Cloud computing · Virtualization · Security · Privacy · Vulnerabilities"
Alruwaili, Fahad F. "Information security, privacy, and compliance models for cloud computing services." Thesis, 2016. http://hdl.handle.net/1828/7119.
Full textBook chapters on the topic "Cloud computing · Virtualization · Security · Privacy · Vulnerabilities"
Naik, Darshana A., G. Shruthi, A. Ashwitha, and Pramod Sunagar. "Security Concerns of Virtualization in Cloud Computing." In Privacy and Security Challenges in Cloud Computing. CRC Press, 2022. http://dx.doi.org/10.1201/9781003219880-5.
Full textTariq, Muhammad Imran, Shahzadi Tayyaba, Muhammad Arfan Jaffar, Muhammad Waseem Ashraf, Shariq Aziz Butt, and Muhammad Arif. "Information security framework for cloud and virtualization security." In Security and Privacy Trends in Cloud Computing and Big Data. CRC Press, 2022. http://dx.doi.org/10.1201/9781003107286-1.
Full textPerilli, Michele Livio, Michelangelo De Bonis, and Crescenzio Gallo. "Cloud Computing." In Contemporary Challenges for Cyber Security and Data Privacy. IGI Global, 2023. http://dx.doi.org/10.4018/979-8-3693-1528-6.ch001.
Full textKadyan, Rubi, Sunita Rani, and Vinod Kr Saroha. "Cloud Security and Privacy." In Cloud Computing's Transformative Power in Computing Environments. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-9984-2.ch006.
Full textPatel, Kaushikkumar. "Cloud Security." In Emerging Trends in Cloud Computing Analytics, Scalability, and Service Models. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-0900-1.ch011.
Full textKaur, Manpreet. "CLOUD COMPUTING." In Futuristic Trends in Network & Communication Technologies Volume 3 Book 2. Iterative International Publisher, Selfypage Developers Pvt Ltd, 2024. http://dx.doi.org/10.58532/v3bgnc2p7ch3.
Full textYadav, Amitabha. "Resilience Cloud Security Framework." In Data Science and Intelligent Computing Techniques. Soft Computing Research Society, 2023. http://dx.doi.org/10.56155/978-81-955020-2-8-39.
Full textYeboah-Boateng, Ezer Osei. "Cyber-Security Concerns With Cloud Computing." In Cyber Security and Threats. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5634-3.ch049.
Full textYeboah-Boateng, Ezer Osei. "Cyber-Security Concerns with Cloud Computing." In Advances in Systems Analysis, Software Engineering, and High Performance Computing. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1721-4.ch005.
Full textSingh, Nimisha. "Cloud Crime and Fraud." In Cyber Law, Privacy, and Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch055.
Full textConference papers on the topic "Cloud computing · Virtualization · Security · Privacy · Vulnerabilities"
Kumar, Biresh, Shreya Kumari, Ritesh Kumar, Vineet Kumar Singh, Binod Kumar Sharma, and Kamaldeep Gupta. "Mitigating Security Vulnerabilities in Cloud-Based Home Automation through Advanced Edge Computing: A Comprehensive Framework for Privacy Enhancement and Data Protection." In 2025 IEEE 14th International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2025. https://doi.org/10.1109/csnt64827.2025.10968051.
Full textPaikrao, Rahul L., and Varsha H. Patil. "Security as a Service Model for Virtualization Vulnerabilities in Cloud Computing." In 2018 International Conference on Advances in Communication and Computing Technology (ICACCT). IEEE, 2018. http://dx.doi.org/10.1109/icacct.2018.8529573.
Full textR. S, Bala Kumar, and Sujitha R. "Efficient Privacy-Preserving Biometric Identification in Cloud Computing." In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/ieko8866/ngcesi23p5.
Full textHahn, Tobias, Thomas Kunz, Markus Schneider, and Sven Vowe. "Vulnerabilities through Usability Pitfalls in Cloud Services: Security Problems due to Unverified Email Addresses." In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2012. http://dx.doi.org/10.1109/trustcom.2012.297.
Full textKioskli, Kitty, Spyridon Papastergiou, Theofanis Fotis, Stefano Silvestri, and Haralambos Mouratidis. "A Self-Organized Swarm Intelligence Solution for Healthcare ICT Security." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004780.
Full textSaini, Vaibhav, Ayushi Jain, Pramoda Meduri, and Verolt Technology Solutions GmbH. "Revolutionizing Commercial Vehicles: Integrating Software-Defined Vehicle Architecture for Enhanced Electrical and Electronic Systems." In WCX SAE World Congress Experience. SAE International, 2025. https://doi.org/10.4271/2025-01-8138.
Full textReports on the topic "Cloud computing · Virtualization · Security · Privacy · Vulnerabilities"
Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Full text