To see the other types of publications on this topic, follow the link: Hypervisor.

Journal articles on the topic 'Hypervisor'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Hypervisor.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shetty, Jyoti, Sahana Upadhaya, Rajarajeshwari H S, Shobha G, and Jayant Chandra. "An Empirical Performance Evaluation of Docker Container, Openstack Virtual Machine and Bare Metal Server." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 1 (July 1, 2017): 205. http://dx.doi.org/10.11591/ijeecs.v7.i1.pp205-213.

Full text
Abstract:
<p>Server virtualization is a fundamental technological innovation that is used extensively in IT enterprises. Server virtualization enables creation of multiple virtual machines on single underlying physical machine. It is realized either in form of hypervisors or containers. Hypervisor is an extra layer of abstraction between the hardware and virtual machines that emulates underlying hardware. In contrast, the more recent container-based virtualization technology runs on host kernel without additional layer of abstraction.Thus container technology is expected to provide near native performance compared to hypervisor based technology. We have conducted a series of experiments to measure and compare the performance of workloads over hypervisor based virtual machines, Docker containers and native bare metal machine. We use a standard benchmark workload suite that stress CPU, memory, disk IO and system. The results obtained show that Docker containers provide better or similar performance compared to traditional hypervisor based virtual machines in almost all the tests. However as expected the native system still provides the best performance as compared to either containers or hypervisors.</p>
APA, Harvard, Vancouver, ISO, and other styles
2

Barrowclough, John Patrick, and Rameez Asif. "Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures." Security and Communication Networks 2018 (June 11, 2018): 1–20. http://dx.doi.org/10.1155/2018/1681908.

Full text
Abstract:
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hypervisor’ that may be attacked and user data can be compromised or hacked. In order to better define these threats to which a cloud hypervisor is exposed, we conducted an in-depth analysis and highlighted the security concerns of the cloud. We basically focused on the two particular issues, i.e., (a) data breaches and (b) weak authentication. For in-depth analysis, we have successfully demonstrated a fully functional private cloud infrastructure running on CloudStack for the software management and orchestrated a valid hack. We analyzed the popular open-source hypervisors, followed by an extensive study of the vulnerability reports associated with them. Based on our findings, we propose the characterization and countermeasures of hypervisor’s vulnerabilities. These investigations can be used to understand the potential attack paths on cloud computing and Cloud-of-Things (CoT) applications and identify the vulnerabilities that enabled them.
APA, Harvard, Vancouver, ISO, and other styles
3

Boberić, Milan. "JEDNO OD REŠENJA ZA PARTICIONISANJE CENTRALNE PROCESORSKE JEDINICE SA VIŠE JEZGARA." Zbornik radova Fakulteta tehničkih nauka u Novom Sadu 34, no. 04 (March 22, 2019): 781–84. http://dx.doi.org/10.24867/02ih07boberic.

Full text
Abstract:
U ovom radu predstavljena je imple­mentacija i optimizacija sistema za particionisanje centralne procesorske jedinice sa više jezgara. Sistem se sastoji iz UltraZed-EG ploče na kojoj je implementiran Xen Hypervisor kao sistem za particionisanje. Xen Hypervisor je virtuelni sloj koji koristi postojeći operativni sistem (host) koji mu omogućava pristup memoriji, prekidima i drugim resursima i omogućava kreiranje virtuelnih jezgara koja se po instrukcijama korisnika mogu raspoređivati na fizička jezgra. Dat je akcenat na real-time particionisanje i optimizaciju Xen Hypervisora u cilju poboljšanja performansi.
APA, Harvard, Vancouver, ISO, and other styles
4

Kashyap, Rekha, and Deo Prakash Vidyarthi. "A Secured Real Time Scheduling Model for Cloud Hypervisor." International Journal of Cloud Applications and Computing 6, no. 4 (October 2016): 97–110. http://dx.doi.org/10.4018/ijcac.2016100106.

Full text
Abstract:
Virtualization is critical to cloud computing and is possible through hypervisors, which maps the Virtual machines((VMs) to physical resources but poses security concerns as users relinquish physical possession of their computation and data. Good amount of research is initiated for resource provisioning on hypervisors, still many issues need to be addressed for security demanding and real time VMs. First work SRT-CreditScheduler (Secured and Real-time), maximizes the success rate by dynamically prioritizing the urgency and the workload of VMs but ensures highest security for all. Another work, SA-RT-CreditScheduler (Security-aware and Real-time) is a dual objective scheduler, which maximizes the success rate of VMs in best possible security range as specified by the VM owner. Though the algorithms can be used by any hypervisor, for the current work they have been implemented on Xen hypervisor. Their effectiveness is validated by comparing it with Xen's, Credit and SEDF scheduler, for security demanding tasks with stringent deadline constraints.
APA, Harvard, Vancouver, ISO, and other styles
5

Fox, Dirk. "Hypervisor." Datenschutz und Datensicherheit - DuD 36, no. 1 (January 2012): 54. http://dx.doi.org/10.1007/s11623-012-0012-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Silva, Daniel, Joao Rafael, and Alexandre Fonte. "Virtualization Maturity in Creating System VM: An Updated Performance Evaluation." International Journal of Electrical and Computer Engineering Research 3, no. 2 (June 15, 2023): 7–17. http://dx.doi.org/10.53375/ijecer.2023.341.

Full text
Abstract:
Virtualization technologies are indispensable in operating data centers and supporting cloud infrastructures, providing cost reduction (CapEx and OpEx), high availability, and disaster recovery. Hypervisor-assisted virtualization is one of the leading virtualization technologies, with the hypervisor being the software layer responsible for presenting the virtualized view of the hardware to system-level VMs. However, the virtualization overhead it introduces has implications into the computing infrastructure performance. This paper revisits key concepts about virtualization, technologies and techniques, types of VMs and hypervisors, and provides an up-to-date comparison between native and VM environments using workload metrics such as CPU and memory scores, disk speed, and network throughput to determine virtualization overhead. Our results show a clear overall trend toward meritorious performance and the maturity of the technologies used to create system-level VMs.
APA, Harvard, Vancouver, ISO, and other styles
7

Patange, Pritam. "Virtual Disks Performance Analysis Using Flexible I/O and Powerstat." International Journal for Research in Applied Science and Engineering Technology 9, no. 10 (October 31, 2021): 267–96. http://dx.doi.org/10.22214/ijraset.2021.38392.

Full text
Abstract:
Abstract: Cloud computing has experienced significant growth in the recent years owing to the various advantages it provides such as 24/7 availability, quick provisioning of resources, easy scalability to name a few. Virtualization is the backbone of cloud computing. Virtual Machines (VMs) are created and executed by a software called Virtual Machine Monitor (VMM) or the hypervisor. It separates compute environments from the actual physical infrastructure. A disk image file representing a single virtual machine is created on the hypervisor’s file system. In this paper, we analysed the runtime performance of multiple different disk image file formats. The analysis comprises of four different parameters of performance namely- bandwidth, latency, input-output operations performed per second (IOPS) and power consumption. The impact of the hypervisor’s block and file sizes is also analysed for the different file formats. The paper aims to act as a reference for the reader in choosing the most appropriate disk file image format for their use case based on the performance comparisons made between different disk image file formats on two different hypervisors – KVM and VirtualBox. Keywords: Virtualization, Virtual disk formats, Cloud computing, fio, KVM, virt-manager, powerstat, VirtualBox.
APA, Harvard, Vancouver, ISO, and other styles
8

Doğan, Atakan, and Kemal Ebcioğlu. "Cloud Building Block Chip for Creating FPGA and ASIC Clouds." ACM Transactions on Reconfigurable Technology and Systems 15, no. 2 (June 30, 2022): 1–35. http://dx.doi.org/10.1145/3466822.

Full text
Abstract:
Hardware-accelerated cloud computing systems based on FPGA chips (FPGA cloud) or ASIC chips (ASIC cloud) have emerged as a new technology trend for power-efficient acceleration of various software applications. However, the operating systems and hypervisors currently used in cloud computing will lead to power, performance, and scalability problems in an exascale cloud computing environment. Consequently, the present study proposes a parallel hardware hypervisor system that is implemented entirely in special-purpose hardware, and that virtualizes application-specific multi-chip supercomputers, to enable virtual supercomputers to share available FPGA and ASIC resources in a cloud system. In addition to the virtualization of multi-chip supercomputers, the system’s other unique features include simultaneous migration of multiple communicating hardware tasks, and on-demand increase or decrease of hardware resources allocated to a virtual supercomputer. Partitioning the flat hardware design of the proposed hypervisor system into multiple partitions and applying the chip unioning technique to its partitions, the present study introduces a cloud building block chip that can be used to create FPGA or ASIC clouds as well. Single-chip and multi-chip verification studies have been done to verify the functional correctness of the hypervisor system, which consumes only a fraction of (10%) hardware resources.
APA, Harvard, Vancouver, ISO, and other styles
9

Caturiyanto, Totok Wahyu, Arief Setyanto, and Eko Pramono. "Analisa Dan Perbandingan Performa Hypervisor ESXi, XEN, VMWARE Workstation Pro, Dan Virtualbox." Jurnal Informa : Jurnal Penelitian dan Pengabdian Masyarakat 6, no. 2 (December 15, 2020): 40–44. http://dx.doi.org/10.46808/informa.v6i2.182.

Full text
Abstract:
Virtualisasi memberi kita banyak ruang untuk berkembang dalam teknologi informasi, dengan satu unit server kita dapat membuat mesin virtual sebanyak yang kita butuhkan. Mengurangi biaya investasi dan operasional untuk memajukan sisi lain bisnis adalah salah satu keuntungan virtualisasi. Salah satu perangkat lunak untuk menjembatani mesin virtual adalah hypervisor atau monitor mesin virtual. Tujuan dari penulisan ini adalah untuk mengetahui hypervisor mana yang merupakan performa terbaik dari keempat hypervisor yang dipilih oleh penulis yang mewakili setiap jenis hypervisor. ESXi, Xen, VMWare Workstation Pro dan Virtualbox. ESXi mewakili hypervisor baremetal berlisensi berbayar, Xen mewakili hypervisor baremetal versi gratis, VMWare Workstation Pro mewakili hosted hypervisor versi berlisensi dan Virtualbox mewakili hosted hypervisor versi gratis. Percobaan dilakukan dengan satu mesin, dengan sumber daya yang sama, dilakukan secara mandiri dan bergantian. Makalah ini menggunakan metode eksperimental untuk mendeskripsikan proses. Kesimpulannya adalah bahwa versi berlisensi atau versi gratis dari empat hypervisor yang disebutkan di atas tidak memengaruhi kinerjanya, hanya berapa banyak fitur yang tersedia dari pengembang.
APA, Harvard, Vancouver, ISO, and other styles
10

Perneel, L., H. Fayyad-Kazan, L. Peng, F. Guan, and M. Timmerman. "Business Hypervisors for Real-time Applications." Engineering, Technology & Applied Science Research 5, no. 4 (August 17, 2015): 832–40. http://dx.doi.org/10.48084/etasr.568.

Full text
Abstract:
System virtualization is one of the hottest trends in information technology today. It is not just another nice to use technology but has become fundamental across the business world. It is successfully used with many business application classes where cloud computing is the most visual one. Recently, it started to be used for soft Real-Time (RT) applications such as IP telephony, media servers, audio and video streaming servers, automotive and communication systems in general. Running these applications on a traditional system (Hardware + Operating System) guarantee their Quality of Service (QoS); virtualizing them means inserting a new layer between the hardware and the (virtual) Operating System (OS), and thus adding extra overhead. Although these applications’ areas do not always demand hard time guarantees, they require the underlying virtualization layer supports low latency and provide adequate computational resources for completion within a reasonable or predictable timeframe. These aspects are intimately intertwined with the logic of the hypervisor scheduler. In this paper, a series of tests are conducted on three hypervisors (VMware ESXi, Hyper-V server and Xen) to provide a benchmark of the latencies added to the applications running on top of them. These tests are conducted for different scenarios (use cases) to take into consideration all the parameters and configurations of the hypervisors’ schedulers. Finally, this benchmark can be used as a reference for choosing the best hypervisor-application combination.
APA, Harvard, Vancouver, ISO, and other styles
11

Liu, Zongyuan, Sergei Stepanenko, Jean Pichon-Pharabod, Amin Timany, Aslan Askarov, and Lars Birkedal. "VMSL: A Separation Logic for Mechanised Robust Safety of Virtual Machines Communicating above FF-A." Proceedings of the ACM on Programming Languages 7, PLDI (June 6, 2023): 1438–62. http://dx.doi.org/10.1145/3591279.

Full text
Abstract:
Thin hypervisors make it possible to isolate key security components like keychains, fingerprint readers, and digital wallets from the easily-compromised operating system. To work together, virtual machines running on top of the hypervisor can make hypercalls to the hypervisor to share pages between each other in a controlled way. However, the design of such hypercall ABIs remains a delicate balancing task between conflicting needs for expressivity, performance, and security. In particular, it raises the question of what makes the specification of a hypervisor, and of its hypercall ABIs, good enough for the virtual machines. In this paper, we validate the expressivity and security of the design of the hypercall ABIs of Arm's FF-A. We formalise a substantial fragment of FF-A as a machine with a simplified ISA in which hypercalls are steps of the machine. We then develop VMSL, a novel separation logic, which we prove sound with respect to the machine execution model, and use it to reason modularly about virtual machines which communicate through the hypercall ABIs, demonstrating the hypercall ABIs' expressivity. Moreover, we use the logic to prove robust safety of communicating virtual machines, that is, the guarantee that even if some of the virtual machines are compromised and execute unknown code, they cannot break the safety properties of other virtual machines running known code. This demonstrates the intended security guarantees of the hypercall ABIs. All the results in the paper have been formalised in Coq using the Iris framework.
APA, Harvard, Vancouver, ISO, and other styles
12

Yang, Xia. "An Effective Approach to Migrate Application to Secure Cloud." Advanced Materials Research 1078 (December 2014): 409–12. http://dx.doi.org/10.4028/www.scientific.net/amr.1078.409.

Full text
Abstract:
In cloud computing, we have requested and used many resources from cloud vendors. Even though, hypervisor is a controller between hardware level applications and user application, Hypervisor will not provide the security for running huge user applications on guest platforms. As a customer perspective cloud is the domain which will offer numerous resources. But in cloud, when the users are running various process/applications on guest OS hypervisor will give the controlling notes or components, system configure and adaptation tools only. However, hypervisor will not have a focal point about security and need to be concerned about the possible factors for an applications which are consecutively perform on the guest OS . It doesn’t care about the end users security facts. This paper proposes an efficient security mechanism for hypervisor control to be developed / performed to improve the security aspects while application is running on virtual machine.
APA, Harvard, Vancouver, ISO, and other styles
13

Abdulraheem, Waleed. "Performance Comparison of Xen AND Hyper-V in Cloud Computing While Using Cryptosystems." International Journal of Advances in Soft Computing and its Applications 14, no. 3 (November 28, 2022): 18–30. http://dx.doi.org/10.15849/ijasca.221128.02.

Full text
Abstract:
Abstract Cloud computing is internet-distributed computing model transferring processes from personal computers or servers to cloud servers. Nowadays, security and performance of cloud computing is considered challenging for both users and cloud service providers. Securing data on cloud computing servers will ensures privacy, confidentiality, integrity, and availability. Using cryptographic techniques is one of the major methods to ensure the data security while storing and transmission. Hypervisor in a cloud is a software that provides abstraction and called virtual machine monitor. Hyper-V and Xen are two different types of hypervisors. In this paper, eight different types of cryptographic algorithms are deployed by using the two hypervisors with instances, to measure the hypervisors performance while encryption and decryption. CPU utilization and response time are measured while encryption and decryption are having different data types and sizes. Results show that Xen is better than Hyper-V in most results on average at 15% and 6.1% for time duration and CPU utilization respectively. Keywords: Cloud Computing, Virtualization, Hypervisors, Xen, Hyper-V, Cryptographic Algorithm
APA, Harvard, Vancouver, ISO, and other styles
14

Zoughbi, Dina Mohsen, and Nitul Dutta. "Hypervisor Vulnerabilities and Some Defense Mechanisms, in Cloud Computing Environment." International Journal of Innovative Technology and Exploring Engineering 10, no. 2 (December 10, 2020): 42–48. http://dx.doi.org/10.35940/ijitee.b8262.1210220.

Full text
Abstract:
Cloud computing is the most important technology at the present time, in terms of reducing applications costs and makes them more scalable and flexible. As the cloud currency is based on building virtualization technology, so it can secure a large-scale environment with limited security capacity such as the cloud. Where, Malicious activities lead the attackers to penetrate virtualization technologies that endanger the infrastructure, and then enabling attacker access to other virtual machines which running on the same vulnerable device. The proposed work in this paper is to review and discuss the attacks and intrusions that allow a malicious virtual machine (VM) to penetrate hypervisor, especially the technologies that malicious virtual machines work on, to steal more than their allocated quota from material resources, and the use of side channels to steal data and Passing buffer barriers between virtual machines. This paper is based on the Security Study of Cloud Hypervisors and classification of vulnerabilities, security issues, and possible solutions that virtual machines are exposed to. Therefore, we aim to provide researchers, academics, and industry with a better understanding of all attacks and defense mechanisms to protect cloud security. and work on building a new security architecture in a virtual technology based on hypervisor to protect and ensure the security of the cloud.
APA, Harvard, Vancouver, ISO, and other styles
15

R.Kennady, Et al. "An Embedded Approach to Hypervisor-Oriented Interruption Virtualization Operation." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4 (April 30, 2023): 388–91. http://dx.doi.org/10.17762/ijritcc.v11i4.9846.

Full text
Abstract:
This paper presents a method for virtualizing interruptions in an embedded hypervisor environment. The method involves the hypervisor taking control of hardware interruptions, providing them to a guest operating system (OS) for virtualization, and simulating interruption events through service threads running on the hypervisor. The guest OS executes a virtualization interruption service program using interruption injection operations provided by the hypervisor, bypassing the need to respond to hardware interruptions. This approach allows interruption service programs to be executed in a conventional stack environment, eliminating the need for copying and preserving the execution context. A comparative analysis with the virtualization scheme in Xen reveals that the proposed method reduces the overhead associated with field preservation, thereby enabling more efficient interruption response.
APA, Harvard, Vancouver, ISO, and other styles
16

Jiménez, Jaime, Leire Muguira, Unai Bidarte, Alejandro Largacha, and Jesús Lázaro. "Specific Electronic Platform to Test the Influence of Hypervisors on the Performance of Embedded Systems." Technologies 10, no. 3 (May 24, 2022): 65. http://dx.doi.org/10.3390/technologies10030065.

Full text
Abstract:
Some complex digital circuits must host various operating systems in a single electronic platform to make real-time and not-real-time tasks compatible or assign different priorities to current applications. For this purpose, some hardware–software techniques—called virtualization—must be integrated to run the operating systems independently, as isolated in different processors: virtual machines. These are monitored and managed by a software tool named hypervisor, which is in charge of allowing each operating system to take control of the hardware resources. Therefore, the hypervisor determines the effectiveness of the system when reacting to events. To measure, estimate or compare the performance of different ways to configure the virtualization, our research team has designed and implemented a specific testbench: an electronic system, based on a complex System on Chip with a processing system and programmable logic, to configure the hardware–software partition and show merit figures, to evaluate the performance of the different options, a field that has received insufficient attention so far. In this way, the fabric of the Field Programmable Gate Array (FPGA) can be exploited for measurements and instrumentation. The platform has been validated with two hypervisors, Xen and Jailhouse, in a multiprocessor System-on-Chip, by executing real-time operating systems and application programs in different contexts.
APA, Harvard, Vancouver, ISO, and other styles
17

Karacali, Hüseyin, Nevzat Dönüm, and Efecan Cebel. "Xen Hypervisor Network Management System." European Journal of Research and Development 3, no. 1 (March 28, 2023): 71–85. http://dx.doi.org/10.56038/ejrnd.v3i1.244.

Full text
Abstract:
On embedded devices, network traffic management is crucial. One of the most fundamental criteria in projects on which embedded devices are created is connecting devices to one another. Additionally, sharing the internet connection, if there is one, has evolved into a need in today's world. In this project, two different operating systems are running by using hypervisor on the same board. The aim of this study is to connect two operating systems running on Xen Hypervisor using a virtual bridge and share the internet connection. An Embedded Linux distribution created with the Yocto project was run on the host domain (Domain-0 in Xen Hypervisor terminology), and Android Automotive OS was run on the guest domain (DomU in Xen Hypervisor terminology). A special topology has been designed for two virtual domains to communicate. Network management is handled by Embedded Linux, as Embedded Linux runs on Domain-0. Moreover, some scripts have been developed on both domains to implement the designed topology. These scripts enable quick and automatic completion of the required actions. In conclusion, this study describes how to automatically establish a network that provides communication between two virtual domains on Xen Hypervisor running on embedded devices. This paper is applicable to any project, provided the Xen hypervisor framework is used. It offers a reliable and efficient solution to connection needs such as infotainment and cluster systems, especially in systems where communication and internet are becoming more widespread for embedded devices such as automotive.
APA, Harvard, Vancouver, ISO, and other styles
18

Seo, Junho, Seonah Lee, Ki-Il Kim, and Kyong Hoon Kim. "A Fine-Grained Secure Service Provisioning Platform for Hypervisor Systems." Electronics 11, no. 10 (May 18, 2022): 1606. http://dx.doi.org/10.3390/electronics11101606.

Full text
Abstract:
As computing technology has been recently widely adopted, most computing devices provide security-related services as basic requirements, which is an important research issue for sustainability of computing devices. The rapid increase of software components makes it difficult to detect or prevent vulnerabilities in the large-size software. One of the prominent approaches for ensuring secure service is the isolation of service which allows the related code and data to be executed only in a particular area. In this paper, we provide a secure service provisioning platform for hypervisor systems. The main contribution of the proposed framework is to enhance the previous secure service provisioning platform in order to solve the non-preemption problem of secure services. Thus, the proposed framework improves the security isolation service in hypervisors and can be used for fine-grained secure service in secure embedded systems.
APA, Harvard, Vancouver, ISO, and other styles
19

Bressoud, Thomas C., and Fred B. Schneider. "Hypervisor-based fault tolerance." ACM Transactions on Computer Systems 14, no. 1 (February 1996): 80–107. http://dx.doi.org/10.1145/225535.225538.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Bressoud, T. C., and F. B. Schneider. "Hypervisor-based fault tolerance." ACM SIGOPS Operating Systems Review 29, no. 5 (December 3, 1995): 1–11. http://dx.doi.org/10.1145/224057.224058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Ko, Wonseok, Jeongwoo Yoo, Ingu Kang, Jinwoo Jun, Inki Hwang, and Sung-Soo Lim. "K-Hypervisor: Design and Implementation of ARM Hypervisor for Real-Time Embedded Systems." KIISE Transactions on Computing Practices 23, no. 4 (April 15, 2017): 199–209. http://dx.doi.org/10.5626/ktcp.2017.23.4.199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

No, Jaechun, and Sung-soon Park. "MultiCache: Multilayered Cache Implementation for I/O Virtualization." Scientific Programming 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/3780163.

Full text
Abstract:
As the virtual machine technology is becoming the essential component in the cloud environment, VDI is receiving explosive attentions from IT market due to its advantages of easier software management, greater data protection, and lower expenses. However, I/O overhead is the critical obstacle to achieve high system performance in VDI. Reducing I/O overhead in the virtualization environment is not an easy task, because it requires scrutinizing multiple software layers of guest-to-hypervisor and also hypervisor-to-host. In this paper, we propose multilayered cache implementation, called MultiCache, which combines the guest-level I/O optimization with the hypervisor-level I/O optimization. The main objective of the guest-level optimization is to mitigate the I/O latency between the back end, shared storage, and the guest VM by utilizing history logs of I/O activities in VM. On the other hand, the hypervisor-level I/O optimization was implemented to minimize the latency caused by the “passing I/O path to the host” and the “contenting physical I/O device among VMs” on the same host server. We executed the performance measurement of MultiCache using the postmark benchmark to verify its effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
23

Đorđević, Borislav, Valentina Timčenko, Nemanja Maček, and Mitko Bogdanoski. "Performance modeling of file system pairs in hypervisor-based virtual environment applied on KVM hypervisor case study." Journal of Computer and Forensic Sciences 1, no. 1 (2022): 55–75. http://dx.doi.org/10.5937/1-42712.

Full text
Abstract:
This paper proposed an approach to mathematical modeling of the file system performance in a hypervisor-based virtual environment, with special focus on the file system pair interactions. The main goal of this research is to conduct an in-depth analysis of the filesystem pair behavior with respect to the performance costs originating from the employed technologies, such as H-Trees, B-Trees and Copy-on-Write/Overwrite update method, and different application workload types. The modeling provides a collection of hypotheses about the expected behavior. The modeling and the hypotheses are validated based on the results obtained for a specific case study. Our study reports on a file system performance comparison in the context of KVM hypervisor-based full hardware virtualization, application-level benchmarking, and 64-bit Linux filesystems Ext4, XFS, and Btrfs. The Filebench benchmark tool is applied for comprehensive testing of the filesystem performance under fair-play conditions. According to the obtained results, we provide a set of recommendations (i.e., a Knowledge Data Base) for optimal filesystem pair selection for the KVM hypervisor. Finally, it is important to note that the proposed modeling is also applicable to other hypervisor-based virtualizations.
APA, Harvard, Vancouver, ISO, and other styles
24

Wijayanto, Danur, Arizona Firdonsyah, Faisal Dharma Adhinata, and Akhmad Jayadi. "Rancang Bangung Private Server Menggunakan Platform Proxmox dengan Studi Kasus: PT.MKNT." Journal ICTEE 2, no. 2 (November 23, 2021): 41. http://dx.doi.org/10.33365/jictee.v2i2.1333.

Full text
Abstract:
Teknologi virtualisasi memerankan peran penting Infrastuktur TI meliputi private data centers dan platform public cloud. Ada beberapa jenis virtualisasi yaitu Virtualisasi Container dan Hypervisor. Virtualisasi berbasis container menggunakan kernel yang sama dan bekerja dalam layer software. Container memungkinkan menjalankan beberapa instance sistem operasi dan perangkat keras yang sama . Berbeda dengan container, hypervisor beroperasi pada level hardware memerlukan Operasi Sistem yang terpisah dengan sistem host. Ada beberapa platform virtualisasi yang dapat digunakan seperti Proxmox, VMWare ESX, dan OpenStack. Proxmox mendukung hypervisor KVM (Kernel-based Virtual Machine), dan LXC Container. KVM mempunyai performa CPU yang lebih baik daripada jenis virtualisasi lainnya seperti native, LXC, dan Docker. Penelitian ini bertujuan untuk mengimplementasi virtualisasi di PT.MKNT menggunakan platform virtualisasi PROXMOX. Hasil menunjukkan dengan menggunakan Platform PROXMOX dapat membantu untuk membuat dan mengelola VM dalam private server.
APA, Harvard, Vancouver, ISO, and other styles
25

Yehuda, Raz Ben, Erez Shlingbaum, Yuval Gershfeld, Shaked Tayouri, and Nezer Jacob Zaidenberg. "Hypervisor memory acquisition for ARM." Forensic Science International: Digital Investigation 37 (June 2021): 301106. http://dx.doi.org/10.1016/j.fsidi.2020.301106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Pratap, Lokendra, and Mukesh Kumar. "A Forensics Approach for Hypervisor." International Journal of Computer Applications 182, no. 33 (December 17, 2018): 11–16. http://dx.doi.org/10.5120/ijca2018918267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

G, Senthil Kumar. "Framework for Hypervisor in Grid." International Journal of Electrical and Electronics Engineering 1, no. 1 (January 25, 2014): 9–15. http://dx.doi.org/10.14445/23488379/ijeee-v1i1p103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Kiperberg, Michael, Roee Leon, Amit Resh, Asaf Algawi, and Nezer J. Zaidenberg. "Hypervisor-Based Protection of Code." IEEE Transactions on Information Forensics and Security 14, no. 8 (August 2019): 2203–16. http://dx.doi.org/10.1109/tifs.2019.2894577.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Almutairi, Badr. "Secure mitigation and migration of virtual machines over hybrid cloud hypervisors infrastructure." International Journal of ADVANCED AND APPLIED SCIENCES 8, no. 7 (July 2021): 7–13. http://dx.doi.org/10.21833/ijaas.2021.07.002.

Full text
Abstract:
As workloads increase in the industry so does the requirement for IT resources. IT companies are now shifting from in-house data centers to cloud-based IT services such as IAAS, PAAS, and SAAS which can offer flexibility at different levels to the developers of the applications working on different projects. Lots of researchers have contributed to migrating virtual machines migration from one cloud service provider to the other in case of backup as a service and other related services. Some of the previous works by some researchers focus on the migration of SAAS and PAAS onto different cloud service provider platforms. This research work focuses on the mitigation and migration of IAAS, PAAS, and SAAS services of the cloud. My contribution in this research will be in how to avoid loss of data during mitigation and migration of the VM from one Hypervisor environment to the other hypervisor environment on a physical machine infrastructure. This will help SME’s to provide end-user access to their data without worrying about the losses which may have incurred if the Mitigation process was not carried out carefully while migrating VM’s from one bare metal Hypervisor environment to the other bare metal Hypervisor environment.
APA, Harvard, Vancouver, ISO, and other styles
30

Fathoni, Muhammad Faris, Seonah Lee, Yoonsoo Kim, Ki-Il Kim, and Kyong Hoon Kim. "Development of Multi-Quadrotor Simulator Based on Real-Time Hypervisor Systems." Drones 5, no. 3 (July 8, 2021): 59. http://dx.doi.org/10.3390/drones5030059.

Full text
Abstract:
Today, simulator technology has been widely used as an important part of quadrotor development such as validation and testing. A good quadrotor simulator can simulate the quadrotor system as closely as possible to the real one. Therefore, in case of multi-quadrotor simulator, the simulator should not only can simulate a multi-quadrotor system, but also every quadrotor should be able to leverage their own resources. To solve this issues, in this paper, we present a hypervisor-based multi-quadrotor simulator. We used RT-Xen as hypervisor, a real-time Xen hypervisor. To ensure every quadrotor runs in real-time manner, we implemented quadrotor simulator in Litmus-RT which is a real-time extension of Linux. In this paper, we conducted some testing and performance evaluation for particular cases on our multi-quadrotor simulator: step-input responses, computation time, and response times. Based on the performance evaluation, our hypervisor-based multi-quadrotor simulator environment is proven to meet the real-time requirements. The results show that three important tasks in quadrotor system: Stability Controllability Augmented System (SCAS), Equation of Motion (EOM), and waypoint following task, are finished before their deadlines; in fact, 20 ms, 10 ms, and 40 ms before the deadlines for SCAS, EOM, and waypoint following, respectively.
APA, Harvard, Vancouver, ISO, and other styles
31

Colafranceschi, Stefano, and Emanuele De Biase. "The Case for a Cost-Effective General-Purpose Computer Cluster for Small Colleges." International Journal of Emerging Technologies in Learning (iJET) 16, no. 04 (February 26, 2021): 4. http://dx.doi.org/10.3991/ijet.v16i04.18837.

Full text
Abstract:
The computational capabilities of commercial CPUs and GPUs reached a plateau but soft-ware applications are usually memory-intense tasks and they commonly need/utilize most recent hardware developments. Computer clusters are an expensive solution, although reliable and versatile, with a limited market share for small colleges. Small schools would typically rely on cloud-based systems because they are more afford-able (less expensive), manageable (no need to worry about the maintenance), and easier to implement (the burden is shifted into the datacenter). Here we provide arguments in favor of an on-campus hardware solution, which, while providing benefits for students, does not present the financial burden associated with larger and more powerful computer clus-ters. We think that instructors of engineering/computer science faculties might find this a viable and workable solution to improve the computing environment of their school without incurring the high cost of a ready-made solution. At the basis of this proposal is the acquisition of inexpensive refurbished hardware and of a type1 VMware hypervisor with a free licensing, as well as of a custom-made web plat-form to control the deployed hypervisors. VMware is a global leader in cloud infrastruc-ture and software-based solutions. In particular, the adoption of a customized "Elastic Sky X integrated" as hypervisor together with Virtual Operating Systems installed in the very same datastore, would constitute an interesting and working proof-of-concept achieving a computer cluster at a fraction of the market cost.
APA, Harvard, Vancouver, ISO, and other styles
32

Zmeev, A. "EVALUATING THE RELATIONSHIP BETWEEN THE SIGNIFICANCE OF COMMANDS FOR IMPLEMENTING UNAUTHORIZED ACCESS TO THE HYPERVISOR THROUGH A VM BASED ON FUZZY LOGIC METHODS." Modeling of systems and processes 13, no. 2 (September 21, 2020): 33–39. http://dx.doi.org/10.12737/2219-0767-2020-13-2-33-39.

Full text
Abstract:
This article describes an approach to using fuzzy logic methods and forming membership functions for criteria of connectivity between the significance of commands and the possibility of unauthorized access to its implementation. Relevant parameters for implementing unauthorized access through a vm or physical network to the hypervisor can be identified based on a specific set of commands, functions, instructions, procedures, utilities, or their parameters, as well as other information about software or hardware, knowledge of which allows the violator to implement each of the current threats of unauthorized access to the hypervisor. Therefore, to assess the relationship between the significance of commands for implementing unauthorized access through a vm to the hypervisor due to the presence of only qualitative evaluation parameters and the absence of their quantitative evaluations, this article offers an evaluation based on fuzzy logic methods implemented as membership functions in MATLAB.
APA, Harvard, Vancouver, ISO, and other styles
33

Dwiyatno, Saleh, Edy Rachmat, Ayu Purnama Sari, and Oki Gustiawan. "IMPLEMENTASI VIRTUALISASI SERVER BERBASIS DOCKER CONTAINER." PROSISKO: Jurnal Pengembangan Riset dan Observasi Sistem Komputer 7, no. 2 (September 1, 2020): 165–75. http://dx.doi.org/10.30656/prosisko.v7i2.2520.

Full text
Abstract:
Abstrak – Docker adalah sebuah aplikasi yang berbasiskan teknologi open source yang memungkinkan developer atau siapapun untuk membuat, menjalankan, melakukan percobaan dan meluncurkan aplikasi didalam sebuah container. Docker membuat proses pemaketan aplikasi bersama komponennya secara cepat dalam sebuah container yang terisolasi, sehingga dapat dijalankan dalam infrastruktur lokal tanpa melakukan perbuahan konfigurasi pada container. Docker juga sangat ringan dan cepat jika dibandingkan dengan mesin virtual yang berbasis hypervisor. SMK Negeri 1 Rangkasbitung mempunyai beberapa server yang mana didalamnya sudah menampung beberapa aplikasi web. Server tersebut berbasis hypervisor sehingga membutuhkan resource besar. Karena setiap VM menjalankan guest OS beserta kernelnya sendiri terpisah dari host. Oleh karena itu, dilakukan implementasi virtualisasi berbasis docker container supaya dapat meningkatkan efektifitas dalam penggunaan sumber daya CPU dan memori pada server. Pengujian dilakukan dengan cara melakukan variasi banyaknya jumlah user request yang berbeda pada masing-masing container menggunakan perangkat lunak apache jmeter. Kata Kunci: Container, CPU, Docker, Hypervisor, Memori
APA, Harvard, Vancouver, ISO, and other styles
34

Shang, Ming. "A New Hardware Isolation Architecture." Applied Mechanics and Materials 530-531 (February 2014): 631–36. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.631.

Full text
Abstract:
Virtual systems are usually attacked due to the vulnerabilities in the hypervisor. The hypervisor cannot solve this because its code size is too big to implement totally right. This paper proposed a new hardware-software architecture based on hardware isolation, which adds a new component in CPU to provide hard-level isolation. Even when the malicious code gets the highest software privilege, it cannot break into another domain from current domain. This paper also gives the implementation of the booting, memory isolation, scheduling, interrupt handling and inter-domain communication.
APA, Harvard, Vancouver, ISO, and other styles
35

Kiperberg, Michael, and Nezer Jacob Zaidenberg. "H-KPP: Hypervisor-Assisted Kernel Patch Protection." Applied Sciences 12, no. 10 (May 18, 2022): 5076. http://dx.doi.org/10.3390/app12105076.

Full text
Abstract:
We present H-KPP, hypervisor-based protection for kernel code and data structures. H-KPP prevents the execution of unauthorized code in kernel mode. In addition, H-KPP protects certain object fields from malicious modifications. H-KPP can protect modern kernels equipped with BPF facilities and loadable kernel modules. H-KPP does not require modifying or recompiling the kernel. Unlike many other systems, H-KPP is based on a thin hypervisor and includes a novel SLAT switching mechanism, which allows H-KPP to achieve very low (≈6%) performance overhead compared to baseline Linux.
APA, Harvard, Vancouver, ISO, and other styles
36

Ahuja, Sanjay P., and Suganya Sridharan. "Performance Evaluation of Hypervisors for Cloud Computing." International Journal of Cloud Applications and Computing 2, no. 3 (July 2012): 26–67. http://dx.doi.org/10.4018/ijcac.2012070102.

Full text
Abstract:
The virtualization of IT infrastructure enables consolidation and pooling of IT resources so they are shared over diverse applications to offset the limitation of shrinking resources and growing business needs. Virtualization provides a logical abstraction of physical computing resources and creates computing environments that are not restricted by physical configuration or implementation. Virtualization is very important for cloud computing because the delivery of services simplified by providing a platform for optimizing complex IT resources in a scalable manner, which makes cloud computing more cost effective. Hypervisor plays an important role in the virtualization of hardware. This software provides a virtual hardware to support running multiple operating systems concurrently using one physical server. This research quantitatively and qualitatively compares the performance of VMware ESXi 4.1, Citrix Systems Xen Server 5.6 and KVM Hypervisors using standard benchmark SPECvirt_sc2010v1.01 formulated by Standard Performance Evaluation Committee (SPEC), which generate various Workloads simulating real life situations.
APA, Harvard, Vancouver, ISO, and other styles
37

Rong Chang, Bao, Hsiu-Fen Tsai, Chi-Ming Chen, and Chien-Feng Huang. "Analysis of virtualized cloud server together with shared storage and estimation of consolidation ratio and TCO/ROI." Engineering Computations 31, no. 8 (October 28, 2014): 1746–60. http://dx.doi.org/10.1108/ec-11-2012-0295.

Full text
Abstract:
Purpose – The physical server transition to virtualized infrastructure server have encountered crucial problems such as server consolidation, virtual machine (VM) performance, workload density, total cost of ownership (TCO), and return on investments (ROIs). In order to solve the problems mentioned above, the purpose of this paper is to perform the analysis of virtualized cloud server together with shared storage as well as the estimation of consolidation ratio and TCO/ROI in server virtualization. Design/methodology/approach – This paper introduces five distinct virtualized cloud computing servers (VCCSs), and provides the appropriate assessment to five well-known hypervisors built in VCCSs. The methodology the authors proposed in this paper will gives people an insight into the problem of physical server transition to virtualized infrastructure server. Findings – As a matter of fact, VM performance seems almost to achieve the same level, but the estimation of VM density and TCO/ROI are totally different among hypervisors. As a result, the authors have the recommendation to choose the hypervisor ESX server if you need a scheme with higher ROI and lower TCO. Alternatively, Proxmox VE would be the second choice if you like to save the initial investment at first and own a pretty well management interface at console. Research limitations/implications – In the performance analysis, instead of ESX 5.0, the authors adopted ESXi 5.0 that is free software, its function is limited, and does not have the full functionality of ESX server, such as: distributed resource scheduling, high availability, consolidated backup, fault tolerance, and disaster recovery. Moreover, this paper do not discuss the security problem on VCCS which is related to access control and cryptograph in VMs to be explored in the further work. Practical implications – In the process of virtualizing the network, ESX/ESXi has restrictions on the brand of the physical network card, only certain network cards can be detected by the VM. For instance: Intel and Broadcom network cards. The newer versions of ESXi 5.0.0 and above now support parts of Realtek series (Realtek 8186, Realtek 8169, and Realtek 8111E). Originality/value – How to precisely assess the hypervisor for server/desktop virtualization is also of hard question needed to deal with it crisply before deploying new IT with VCCS on site. The authors have utilized the VMware calculator and developed an approach to server/desktop consolidation, virtualization performance, VM density, TCO, and ROIs. As a result, in this paper the authors conducted a comprehensive approach to analyze five well-known hypervisors and will give the recommendation for IT manager to choose a right solution for server virtualization.
APA, Harvard, Vancouver, ISO, and other styles
38

Szefer, Jakub, and Ruby B. Lee. "Architectural support for hypervisor-secure virtualization." ACM SIGARCH Computer Architecture News 40, no. 1 (April 18, 2012): 437–50. http://dx.doi.org/10.1145/2189750.2151022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Bauman, Erick, Gbadebo Ayoade, and Zhiqiang Lin. "A Survey on Hypervisor-Based Monitoring." ACM Computing Surveys 48, no. 1 (September 29, 2015): 1–33. http://dx.doi.org/10.1145/2775111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Závacký, Pavol, Andrej Eliáš, and Maximilián Stémy. "Hypervisor for Virtualization in Private Cloud." Research Papers Faculty of Materials Science and Technology Slovak University of Technology 23, s1 (August 1, 2015): 79–84. http://dx.doi.org/10.1515/rput-2015-0030.

Full text
Abstract:
Abstract The article deals with testing and choosing right virtualization platform with management tools for building private cloud, in which methods for power control of virtual machines can be applied. Main brick in every virtualization platform is hypervisor which carries out virtualization and management tools which deliver the services such as web management, storage management and resources management from one place.
APA, Harvard, Vancouver, ISO, and other styles
41

Suzuki, Yusuke, Shinpei Kato, Hiroshi Yamada, and Kenji Kono. "GPUvm: GPU Virtualization at the Hypervisor." IEEE Transactions on Computers 65, no. 9 (September 1, 2016): 2752–66. http://dx.doi.org/10.1109/tc.2015.2506582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Ambika, M., and Kolasani Ramchand H. Rao. "A Novel Framework for Hypervisor Design." Procedia Computer Science 79 (2016): 190–98. http://dx.doi.org/10.1016/j.procs.2016.03.025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Fattori, Aristide, Andrea Lanzi, Davide Balzarotti, and Engin Kirda. "Hypervisor-based malware protection with AccessMiner." Computers & Security 52 (July 2015): 33–50. http://dx.doi.org/10.1016/j.cose.2015.03.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Crespo, A., M. Masmano, J. Coronel, S. Peiró, P. Balbastre, and J. Simó. "Multicore partitioned systems based on hypervisor." IFAC Proceedings Volumes 47, no. 3 (2014): 12293–98. http://dx.doi.org/10.3182/20140824-6-za-1003.02410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Leon, Roee S., Michael Kiperberg, Anat Anatey Leon Zabag, Amit Resh, Asaf Algawi, and Nezer J. Zaidenberg. "Hypervisor-Based White Listing of Executables." IEEE Security & Privacy 17, no. 5 (September 2019): 58–67. http://dx.doi.org/10.1109/msec.2019.2910218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Szefer, Jakub, and Ruby B. Lee. "Architectural support for hypervisor-secure virtualization." ACM SIGPLAN Notices 47, no. 4 (June 2012): 437–50. http://dx.doi.org/10.1145/2248487.2151022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Spink, Tom, Harry Wagstaff, and Björn Franke. "A Retargetable System-level DBT Hypervisor." ACM Transactions on Computer Systems 36, no. 4 (June 11, 2020): 1–24. http://dx.doi.org/10.1145/3386161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Gamess, Eric, Mausam Parajuli, and Syed Shah. "Performance Evaluation of the KVM Hypervisor Running on ARM-Based Single-Board Computers." International journal of Computer Networks & Communications 15, no. 2 (March 30, 2023): 147–64. http://dx.doi.org/10.5121/ijcnc.2023.15208.

Full text
Abstract:
Single-Board Computers (SBCs) were initially targeted for education and small projects with low power-processing needs. However, their computational power has increased dramatically in the last few years, and they are now used in more advanced developments. In this paper, a study of the feasibility of using ARM-based SBCs as hypervisors is done. The authors selected the Raspberry Pi 4 Model B and the ODROID-N2+ and assessed them as virtualization servers, when running up to four VMs simultaneously, with the Linux de facto hypervisor (KVM). The tests performed in this work include: reading and writing throughputs in different types of storage media, processing power assessment, memory performance, timed compilations of open-source software, and performance of encryption algorithms. The results of the experiments showed that the amount of memory available in these SBCs is a determinant factor about the maximum number of VMs that can be executed simultaneously. The performance of the ODROID-N2+ exceeded the Raspberry Pi 4 Model B. However, the community support received by the latter is huge compared to the one of the former, and this can be a game changer when selecting a viable platform.
APA, Harvard, Vancouver, ISO, and other styles
49

Alnaim, Abdulrahman K. "Misuse Patterns from the Threat of Modification of Non-Control Data in Network Function Virtualization." Future Internet 14, no. 7 (June 30, 2022): 201. http://dx.doi.org/10.3390/fi14070201.

Full text
Abstract:
Network Function Virtualization (NFV) is a virtual network model, the goal of which is a cost-efficient transition of the hardware infrastructure into a flexible and reliable software platform. However, this transition comes at the cost of more security threats. A key part of this virtualization environment is the hypervisor, which emulates the hardware resources to provide a runtime environment for virtual machines (VMs). The hypervisor is considered a major attack vector and must be secured to ensure network service continuity. The virtualization environment contains critical non-control data where compromise could lead to several misuses, including information leakage and privilege and resource modification. In this paper, we present a misuse pattern for an attack that exploits the security vulnerabilities of the hypervisor to compromise the integrity of non-control data in the NFV environment. Misuse patterns are used to describe how attacks are carried out from the attackers’ perspective. The threat of modification of non-control data can lead to several misuses, and in this paper, we discuss three of them. The defenses to this attack can be incorporated into the Security Reference Architecture (SRA) of the NFV system to prevent these misuses.
APA, Harvard, Vancouver, ISO, and other styles
50

Alonso, Sara, Jesús Lázaro, Jaime Jiménez, Unai Bidarte, and Leire Muguira. "Evaluating Latency in Multiprocessing Embedded Systems for the Smart Grid." Energies 14, no. 11 (June 5, 2021): 3322. http://dx.doi.org/10.3390/en14113322.

Full text
Abstract:
Smart grid endpoints need to use two environments within a processing system (PS), one with a Linux-type operating system (OS) using the Arm Cortex-A53 cores for management tasks, and the other with a standalone execution or a real-time OS using the Arm Cortex-R5 cores. The Xen hypervisor and the OpenAMP framework allow this, but they may introduce a delay in the system, and some messages in the smart grid need a latency lower than 3 ms. In this paper, the Linux thread latencies are characterized by the Cyclictest tool. It is shown that when Xen hypervisor is used, this scenario is not suitable for the smart grid as it does not meet the 3 ms timing constraint. Then, standalone execution as the real-time part is evaluated, measuring the delay to handle an interrupt created in programmable logic (PL). The standalone application was run in A53 and R5 cores, with Xen hypervisor and OpenAMP framework. These scenarios all met the 3 ms constraint. The main contribution of the present work is the detailed characterization of each real-time execution, in order to facilitate selecting the most suitable one for each application.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography