Journal articles on the topic 'Cloud computing · Virtualization · Security · Privacy · Vulnerabilities'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cloud computing · Virtualization · Security · Privacy · Vulnerabilities.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Uddin, Mueen, Anjum Khalique, Awais Khan Jumani, Syed Sajid Ullah, and Saddam Hussain. "Next-Generation Blockchain-Enabled Virtualized Cloud Security Solutions: Review and Open Challenges." Electronics 10, no. 20 (2021): 2493. http://dx.doi.org/10.3390/electronics10202493.
Full textRenjith, E. Jeslin. "Revolutionizing Cloud Security: Innovative Approaches for Safeguarding Data Integrity." FMDB Transactions on Sustainable Computer Letters 2, no. 2 (2024): 111–19. http://dx.doi.org/10.69888/ftscl.2024.000185.
Full textPragya, Rathore, and Mishra Sachin. "5G Security Challenges & Solutions: A Comprehensive Survey." International Journal for Research Trends and Innovation 9, no. 5 (2024): 517–32. https://doi.org/10.5281/zenodo.11568989.
Full textAdi, Maheswara Reddy G. 1. Dr K. Venkata Rao2 Dr JVR Murthy3. "AN EFFECTIVE AND SECURED TECHNIQUE FOR SIDE-CHANNEL ATTACKS IN CLOUD." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 11 (2017): 226–33. https://doi.org/10.5281/zenodo.1049426.
Full textMisono, Masanori, Dimitrios Stavrakakis, Nuno Santos, and Pramod Bhatotia. "Confidential VMs Explained: An Empirical Analysis of AMD SEV-SNP and Intel TDX." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 3 (2024): 1–42. https://doi.org/10.1145/3700418.
Full textBobda, Christophe, Joel Mandebi Mbongue, Paul Chow, et al. "The Future of FPGA Acceleration in Datacenters and the Cloud." ACM Transactions on Reconfigurable Technology and Systems 15, no. 3 (2022): 1–42. http://dx.doi.org/10.1145/3506713.
Full textN, Saravanan, and Umamakeswari A. "Security Vulnerabilities of Virtualization Technique." International Journal of Engineering & Technology 7, no. 2.24 (2018): 478. http://dx.doi.org/10.14419/ijet.v7i2.24.12140.
Full textSabir Abbas and Shan-e-Zahra. "Review on Huawei Fusion Sphere Security." Lahore Garrison University Research Journal of Computer Science and Information Technology 2, no. 2 (2018): 32–37. http://dx.doi.org/10.54692/lgurjcsit.2018.020234.
Full textSaugatdeep, Ranabhat, Alexey N. Nazarov, and Tuleun Terhemen Daniel. "VIRTUALIZATION SECURITY: A GATEWAY TO SECURE CLOUD COMPUTING." SYNCHROINFO JOURNAL 8, no. 6 (2022): 2–9. http://dx.doi.org/10.36724/2664-066x-2022-8-6-2-9.
Full textZhou, Guo Hong. "Study of Cloud Computing and Advanced Manufacturing Technology under Information Technology Development." Applied Mechanics and Materials 484-485 (January 2014): 227–30. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.227.
Full textAvneet, kaur, Gaurav Gupta Dr., and Gurjit Singh Bhathal Dr. "ROLE OF VIRTUALIZATION IN CLOUD COMPUTING." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 4, no. 7 (2017): 143–50. https://doi.org/10.5281/zenodo.835421.
Full textAnnane, Boubakeur, and Osman Ghazali. "Virtualization-Based Security Techniques on Mobile Cloud Computing: Research Gaps and Challenges." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 04 (2019): 20. http://dx.doi.org/10.3991/ijim.v13i04.10515.
Full textKumar, K. Dinesh, and E. Umamaheswari. "AN AUTHENTICATED, SECURE VIRTUALIZATION MANAGEMENT SYSTEM IN CLOUD COMPUTING." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 45. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19544.
Full textKumar, Sarvesh, Himanshu Gautam, Shivendra Singh, and Mohammad Shafeeq. "Top Vulnerabilities in Cloud Computing." ECS Transactions 107, no. 1 (2022): 16887–99. http://dx.doi.org/10.1149/10701.16887ecst.
Full textZoughbi, Dina Mohsen, and Nitul Dutta. "Hypervisor Vulnerabilities and Some Defense Mechanisms, in Cloud Computing Environment." International Journal of Innovative Technology and Exploring Engineering 10, no. 2 (2020): 42–48. http://dx.doi.org/10.35940/ijitee.b8262.1210220.
Full textDina, Mohsen Zoughbi, and Dutta Nitul. "Hypervisor Vulnerabilities and Some Defense Mechanisms, in Cloud Computing Environment." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 10, no. 2 (2020): 42–48. https://doi.org/10.5281/zenodo.5835945.
Full textSowmya, Pappu, and R. Kumar. "AN EFFICIENT APPROACH TO IMPLEMENT FEDERATED CLOUDS." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 40. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19543.
Full textChandana Kumari, P. ILA, S. Swarajya Laxmi, B. Rekha, et al. "VMM based Secured Virtualization in Cloud-Computing." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 3 (2016): 643. http://dx.doi.org/10.11591/ijeecs.v4.i3.pp643-648.
Full textJournal, IJSREM. "Cloud Computing Security." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–7. http://dx.doi.org/10.55041/ijsrem38330.
Full textZheng, Luxin, Jian Zhang, Faxin Lin, and Xiangyi Wang. "Feature-Fusion-Based Abnormal-Behavior-Detection Method in Virtualization Environment." Electronics 12, no. 16 (2023): 3386. http://dx.doi.org/10.3390/electronics12163386.
Full textAdil Dheyab, Omar, Ahmed Ibrahim Turki, and B. Rahmatullah B. Rahmatullah. "Threats and Vulnerabilities Affecting the Adoption of Cloud Computing in Iraq." Journal of Social Sciences Research, SPI6 (December 25, 2018): 599–606. http://dx.doi.org/10.32861/jssr.spi6.599.606.
Full textNarayana, K. E., and K. Jayashree. "Security Analysis of Storage, Virtualization, Infrastructure and Standardization in Cloud Computing." Journal of Computational and Theoretical Nanoscience 17, no. 8 (2020): 3754–58. http://dx.doi.org/10.1166/jctn.2020.9315.
Full textRaja, Vinayak. "Exploring Challenges and Solutions in Cloud Computing: A Review of Data Security and Privacy Concerns." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 4, no. 1 (2024): 121–41. http://dx.doi.org/10.60087/jaigs.vol4.issue1.p141.
Full textRaja, Vinayak. "Exploring Challenges and Solutions in Cloud Computing: A Review of Data Security and Privacy Concerns." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 4, no. 1 (2024): 121–44. http://dx.doi.org/10.60087/jaigs.v4i1.86.
Full textZhu, Hui, Yingfang Xue, Xiaofeng Chen, Qiang Li, and Hui Li. "V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service." Mobile Information Systems 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/841292.
Full textDjamal, Ziani, and Al-Muwayshir Ruba. "Improving Privacy and Security in Multi-Tenant Cloud ERP Systems." Advanced Computing: An International Journal (ACIJ) 8, no. 5 (2017): 01–15. https://doi.org/10.5121/acij.2017.8500.
Full textDjamal, Ziani, and Al-Muwayshir Ruba. "Improving Privacy and Security in Multi-Tenant Cloud ERP Systems." Advanced Computing: An International Journal (ACIJ) 8, no. 5 (2017): 01–15. https://doi.org/10.5121/acij.2017.8501.
Full textKazi, Abdullah A. "Enhancing Security in Cloud Computing: Challenges, Techniques and Future Trends." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50628.
Full textMotawie, Rola, Mahmoud M. El-Khouly, and Samir Abou El-Seoud. "Security Problems in Cloud Computing." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 4, no. 4 (2016): 36. http://dx.doi.org/10.3991/ijes.v4i4.6538.
Full textAhmed Ibrahim Turki and Qasim Mohammed Hussein. "Solutions of diagnosis of security issues and attacks for storage in cloud computing." Tikrit Journal of Pure Science 23, no. 4 (2018): 118–23. http://dx.doi.org/10.25130/tjps.v23i4.532.
Full textAnnane, Boubakeur, Adel Alti, and Osman Ghazali. "Research gaps based virtualization in mobile cloud computing." International Journal of Advanced Computer Research 10, no. 51 (2020): 212–22. http://dx.doi.org/10.19101/ijacr.2020.1048101.
Full textAlharbe, Nawaf, Abeer Aljohani, and Mohamed Ali Rakrouki. "A Novel Data Partitioning Method for Active Privacy Protection Applied to Medical Records." Electronics 12, no. 6 (2023): 1489. http://dx.doi.org/10.3390/electronics12061489.
Full textKhan, Nayeem, and Tariq Ahmad. "A Deep Study on Security Vulnerabilities in Virtualization at Cloud Computing." International Journal of Computer Applications 173, no. 1 (2017): 15–19. http://dx.doi.org/10.5120/ijca2017915204.
Full textSingh, Dr Satinderjeet. "A Comprehensive Review on Data Security and Threats for Data Management in Cloud Computing." Middle East Journal of Applied Science & Technology 05, no. 02 (2022): 201–9. http://dx.doi.org/10.46431/mejast.2022.5220.
Full textDr., Satinderjeet Singh. "A Comprehensive Review on Data Security and Threats for Data Management in Cloud Computing." Middle East Journal of Applied Science & Technology 5, no. 2 (2022): 201–9. https://doi.org/10.46431/MEJAST.2022.5220.
Full textResearcher. "IMPROVING SECURITY FOR VIRTUAL MACHINES IN CLOUD VIRTUALIZATION." International Journal of Computer Engineering and Technology (IJCET) 15, no. 5 (2024): 351–65. https://doi.org/10.5281/zenodo.13828259.
Full textAli, Gholami, and Laure Erwin. "BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD." International Journal of Network Security & Its Applications (IJNSA) 8, no. 1 (2016): 59 to 79. https://doi.org/10.5281/zenodo.3345302.
Full textOuda, Alia J., Ali N. Yousif, Ayat S. Hasan, Hassan M. Ibrahim, and Methaq A. Shyaa. "The Impact of Cloud Computing on Network Security and the Risk for Organization Behaviors." Webology 19, no. 1 (2022): 195–206. http://dx.doi.org/10.14704/web/v19i1/web19015.
Full textDr. Ashutosh Sharma. "The Role of Cloud Computing in Shaping Network Security: Implications for Organizational Behavior." Innovative Research Thoughts 10, no. 3 (2024): 183–205. http://dx.doi.org/10.36676/irt.v10.i3.1501.
Full textKhan, Nabeel, and Adil Al-Yasiri. "Cloud Security Threats and Techniques to Strengthen Cloud Computing Adoption Framework." International Journal of Information Technology and Web Engineering 11, no. 3 (2016): 50–64. http://dx.doi.org/10.4018/ijitwe.2016070104.
Full textNeerav Nishant, Et al. "The Proposed Framework for Cloud Computing System Security and Privacy Services." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 1197–205. http://dx.doi.org/10.17762/ijritcc.v11i9.9034.
Full textTang, Kai. "Research on Security Strategies of Digital Library Based on Cloud Computing Platform." Advanced Materials Research 734-737 (August 2013): 3171–74. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3171.
Full textJanak Bharat Bhalla. "Safeguarding sensitive data with confidential computing." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 421–27. https://doi.org/10.30574/wjaets.2025.15.2.0505.
Full textAsvija B., Eswari R., and Bijoy M. B. "Security Threat Modelling With Bayesian Networks and Sensitivity Analysis for IAAS Virtualization Stack." Journal of Organizational and End User Computing 33, no. 4 (2021): 44–69. http://dx.doi.org/10.4018/joeuc.20210701.oa3.
Full textKe, Changbo, Zhiqiu Huang, Weiwei Li, Yi Sun, and Fangxiong Xiao. "Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing." Journal of Applied Mathematics 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/240425.
Full textAhirwar, Dr Anamika, Nikita Prajapat, and Simran Raj. "AN ANALYTICAL STUDY ON CLOUD COMPUTING." BSSS journal of computer 12, no. 1 (2021): 30–35. http://dx.doi.org/10.51767/jc1204.
Full textSingh, Devesh, and Ashwini Kumar Dautaniya. "Cloud Computing Security Challenges and Solution." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, no. 3 (2019): 1185–90. http://dx.doi.org/10.61841/turcomat.v10i3.14399.
Full textSahmim Ep Guerbouj, Syrine, Hamza Gharsellaoui, and Sadok Bouamama. "A Comprehensive Survey on Privacy and Security Issues in Cloud Computing, Internet of Things and Cloud of Things." International Journal of Service Science, Management, Engineering, and Technology 10, no. 3 (2019): 32–44. http://dx.doi.org/10.4018/ijssmet.2019070103.
Full textLeyla Kerimli, Leyla Kerimli. "SECURITY ISSUES IN MOBILE CLOUD COMPUTING TECHNOLOGY." PAHTEI-Procedings of Azerbaijan High Technical Educational Institutions 47, no. 12 (2024): 406–13. https://doi.org/10.36962/pahtei47122024-43.
Full textALhadi, Fatima Ismail, Nagi Ali AL-Shaibany, and Sharaf Abdulhak AL-Homdyl. "Survey on Cloud Computing Security." مجلة جامعة صنعاء للعلوم التطبيقية والتكنولوجيا 2, no. 4 (2024): 381–90. http://dx.doi.org/10.59628/jast.v2i4.1025.
Full text