To see the other types of publications on this topic, follow the link: Hypervizor hypervisor.

Journal articles on the topic 'Hypervizor hypervisor'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Hypervizor hypervisor.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shetty, Jyoti, Sahana Upadhaya, Rajarajeshwari H S, Shobha G, and Jayant Chandra. "An Empirical Performance Evaluation of Docker Container, Openstack Virtual Machine and Bare Metal Server." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 1 (2017): 205. http://dx.doi.org/10.11591/ijeecs.v7.i1.pp205-213.

Full text
Abstract:
<p>Server virtualization is a fundamental technological innovation that is used extensively in IT enterprises. Server virtualization enables creation of multiple virtual machines on single underlying physical machine. It is realized either in form of hypervisors or containers. Hypervisor is an extra layer of abstraction between the hardware and virtual machines that emulates underlying hardware. In contrast, the more recent container-based virtualization technology runs on host kernel without additional layer of abstraction.Thus container technology is expected to provide near native per
APA, Harvard, Vancouver, ISO, and other styles
2

Boberić, Milan. "JEDNO OD REŠENJA ZA PARTICIONISANJE CENTRALNE PROCESORSKE JEDINICE SA VIŠE JEZGARA." Zbornik radova Fakulteta tehničkih nauka u Novom Sadu 34, no. 04 (2019): 781–84. http://dx.doi.org/10.24867/02ih07boberic.

Full text
Abstract:
U ovom radu predstavljena je imple­mentacija i optimizacija sistema za particionisanje centralne procesorske jedinice sa više jezgara. Sistem se sastoji iz UltraZed-EG ploče na kojoj je implementiran Xen Hypervisor kao sistem za particionisanje. Xen Hypervisor je virtuelni sloj koji koristi postojeći operativni sistem (host) koji mu omogućava pristup memoriji, prekidima i drugim resursima i omogućava kreiranje virtuelnih jezgara koja se po instrukcijama korisnika mogu raspoređivati na fizička jezgra. Dat je akcenat na real-time particionisanje i optimizaciju Xen Hypervisora u cilju poboljšanja
APA, Harvard, Vancouver, ISO, and other styles
3

Barrowclough, John Patrick, and Rameez Asif. "Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures." Security and Communication Networks 2018 (June 11, 2018): 1–20. http://dx.doi.org/10.1155/2018/1681908.

Full text
Abstract:
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hypervisor’ that may be attacked and user data can be compromised or hacked. In order to better define these threats to which a cloud hypervisor is exposed, we conducted an in-depth analysis and highlighted the security concerns of the cloud. We basically focused on the two particular issues, i.e., (a) data breaches and (b) weak authentication. For in-depth analysis, we have successfully demonstrated a fully functional private
APA, Harvard, Vancouver, ISO, and other styles
4

Kashyap, Rekha, and Deo Prakash Vidyarthi. "A Secured Real Time Scheduling Model for Cloud Hypervisor." International Journal of Cloud Applications and Computing 6, no. 4 (2016): 97–110. http://dx.doi.org/10.4018/ijcac.2016100106.

Full text
Abstract:
Virtualization is critical to cloud computing and is possible through hypervisors, which maps the Virtual machines((VMs) to physical resources but poses security concerns as users relinquish physical possession of their computation and data. Good amount of research is initiated for resource provisioning on hypervisors, still many issues need to be addressed for security demanding and real time VMs. First work SRT-CreditScheduler (Secured and Real-time), maximizes the success rate by dynamically prioritizing the urgency and the workload of VMs but ensures highest security for all. Another work,
APA, Harvard, Vancouver, ISO, and other styles
5

Perneel, L., H. Fayyad-Kazan, L. Peng, F. Guan, and M. Timmerman. "Business Hypervisors for Real-time Applications." Engineering, Technology & Applied Science Research 5, no. 4 (2015): 832–40. http://dx.doi.org/10.48084/etasr.568.

Full text
Abstract:
System virtualization is one of the hottest trends in information technology today. It is not just another nice to use technology but has become fundamental across the business world. It is successfully used with many business application classes where cloud computing is the most visual one. Recently, it started to be used for soft Real-Time (RT) applications such as IP telephony, media servers, audio and video streaming servers, automotive and communication systems in general. Running these applications on a traditional system (Hardware + Operating System) guarantee their Quality of Service (
APA, Harvard, Vancouver, ISO, and other styles
6

Zoughbi, Dina Mohsen, and Nitul Dutta. "Hypervisor Vulnerabilities and Some Defense Mechanisms, in Cloud Computing Environment." International Journal of Innovative Technology and Exploring Engineering 10, no. 2 (2020): 42–48. http://dx.doi.org/10.35940/ijitee.b8262.1210220.

Full text
Abstract:
Cloud computing is the most important technology at the present time, in terms of reducing applications costs and makes them more scalable and flexible. As the cloud currency is based on building virtualization technology, so it can secure a large-scale environment with limited security capacity such as the cloud. Where, Malicious activities lead the attackers to penetrate virtualization technologies that endanger the infrastructure, and then enabling attacker access to other virtual machines which running on the same vulnerable device. The proposed work in this paper is to review and discuss
APA, Harvard, Vancouver, ISO, and other styles
7

Rong Chang, Bao, Hsiu-Fen Tsai, Chi-Ming Chen, and Chien-Feng Huang. "Analysis of virtualized cloud server together with shared storage and estimation of consolidation ratio and TCO/ROI." Engineering Computations 31, no. 8 (2014): 1746–60. http://dx.doi.org/10.1108/ec-11-2012-0295.

Full text
Abstract:
Purpose – The physical server transition to virtualized infrastructure server have encountered crucial problems such as server consolidation, virtual machine (VM) performance, workload density, total cost of ownership (TCO), and return on investments (ROIs). In order to solve the problems mentioned above, the purpose of this paper is to perform the analysis of virtualized cloud server together with shared storage as well as the estimation of consolidation ratio and TCO/ROI in server virtualization. Design/methodology/approach – This paper introduces five distinct virtualized cloud computing se
APA, Harvard, Vancouver, ISO, and other styles
8

Ahuja, Sanjay P., and Suganya Sridharan. "Performance Evaluation of Hypervisors for Cloud Computing." International Journal of Cloud Applications and Computing 2, no. 3 (2012): 26–67. http://dx.doi.org/10.4018/ijcac.2012070102.

Full text
Abstract:
The virtualization of IT infrastructure enables consolidation and pooling of IT resources so they are shared over diverse applications to offset the limitation of shrinking resources and growing business needs. Virtualization provides a logical abstraction of physical computing resources and creates computing environments that are not restricted by physical configuration or implementation. Virtualization is very important for cloud computing because the delivery of services simplified by providing a platform for optimizing complex IT resources in a scalable manner, which makes cloud computing
APA, Harvard, Vancouver, ISO, and other styles
9

Fox, Dirk. "Hypervisor." Datenschutz und Datensicherheit - DuD 36, no. 1 (2012): 54. http://dx.doi.org/10.1007/s11623-012-0012-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Colafranceschi, Stefano, and Emanuele De Biase. "The Case for a Cost-Effective General-Purpose Computer Cluster for Small Colleges." International Journal of Emerging Technologies in Learning (iJET) 16, no. 04 (2021): 4. http://dx.doi.org/10.3991/ijet.v16i04.18837.

Full text
Abstract:
The computational capabilities of commercial CPUs and GPUs reached a plateau but soft-ware applications are usually memory-intense tasks and they commonly need/utilize most recent hardware developments. Computer clusters are an expensive solution, although reliable and versatile, with a limited market share for small colleges.
 Small schools would typically rely on cloud-based systems because they are more afford-able (less expensive), manageable (no need to worry about the maintenance), and easier to implement (the burden is shifted into the datacenter). Here we provide arguments in favo
APA, Harvard, Vancouver, ISO, and other styles
11

Kang, Minsu, and Sangjun Lee. "Mcredit2: Enhanced High-Performance Xen Scheduler via Dynamic Weight Allocation." Journal of Sensors 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/4628245.

Full text
Abstract:
Generally, operating only a single host on a single server results in hardware underutilization. Thus, hypervisors (e.g., Xen) have been developed to allow several hosts to operate on a single server. The Xen hypervisor provides processor schedulers (e.g., Credit and Credit2 schedulers) to assign processors to each host. The Credit2 scheduler provides work assurance to the domain relative to latency and it evenly assigns processors to each domain. In addition, the Credit2 scheduler can assign a weight value to each host. A greater host weight value allows processors to be assigned to a host fo
APA, Harvard, Vancouver, ISO, and other styles
12

Chang, Bao Rong, Hsiu-Fen Tsai, and Chi-Ming Chen. "Empirical Analysis of Server Consolidation and Desktop Virtualization in Cloud Computing." Mathematical Problems in Engineering 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/947234.

Full text
Abstract:
Physical server transited to virtual server infrastructure (VSI) and desktop device to virtual desktop infrastructure (VDI) have the crucial problems of server consolidation, virtualization performance, virtual machine density, total cost of ownership (TCO), and return on investments (ROI). Besides, how to appropriately choose hypervisor for the desired server/desktop virtualization is really challenging, because a trade-off between virtualization performance and cost is a hard decision to make in the cloud. This paper introduces five hypervisors to establish the virtual environment and then g
APA, Harvard, Vancouver, ISO, and other styles
13

Yang, Xia. "An Effective Approach to Migrate Application to Secure Cloud." Advanced Materials Research 1078 (December 2014): 409–12. http://dx.doi.org/10.4028/www.scientific.net/amr.1078.409.

Full text
Abstract:
In cloud computing, we have requested and used many resources from cloud vendors. Even though, hypervisor is a controller between hardware level applications and user application, Hypervisor will not provide the security for running huge user applications on guest platforms. As a customer perspective cloud is the domain which will offer numerous resources. But in cloud, when the users are running various process/applications on guest OS hypervisor will give the controlling notes or components, system configure and adaptation tools only. However, hypervisor will not have a focal point about sec
APA, Harvard, Vancouver, ISO, and other styles
14

Lingayat, Ashish, Ranjana R. Badre, and Anil Kumar Gupta. "Integration of Linux Containers in OpenStack: An Introspection." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (2018): 1094. http://dx.doi.org/10.11591/ijeecs.v12.i3.pp1094-1105.

Full text
Abstract:
<p>In cloud computing, sharing of resources is supported using heavy weighted traditional virtualization techniques. Such techniques involve hypervisors to emulate hardware for creating virtual machines. The inclusion of an additional layer of hypervisor over host operating system depreciates the performance of the virtual machine. Recent evolution is a lightweight alternative to the virtual machine called containers which have gained<br />popularity among developers and administrators. Container Based virtualization has proven very efficient regarding performance, and many industr
APA, Harvard, Vancouver, ISO, and other styles
15

Bressoud, Thomas C., and Fred B. Schneider. "Hypervisor-based fault tolerance." ACM Transactions on Computer Systems 14, no. 1 (1996): 80–107. http://dx.doi.org/10.1145/225535.225538.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Bressoud, T. C., and F. B. Schneider. "Hypervisor-based fault tolerance." ACM SIGOPS Operating Systems Review 29, no. 5 (1995): 1–11. http://dx.doi.org/10.1145/224057.224058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ko, Wonseok, Jeongwoo Yoo, Ingu Kang, Jinwoo Jun, Inki Hwang, and Sung-Soo Lim. "K-Hypervisor: Design and Implementation of ARM Hypervisor for Real-Time Embedded Systems." KIISE Transactions on Computing Practices 23, no. 4 (2017): 199–209. http://dx.doi.org/10.5626/ktcp.2017.23.4.199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

No, Jaechun, and Sung-soon Park. "MultiCache: Multilayered Cache Implementation for I/O Virtualization." Scientific Programming 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/3780163.

Full text
Abstract:
As the virtual machine technology is becoming the essential component in the cloud environment, VDI is receiving explosive attentions from IT market due to its advantages of easier software management, greater data protection, and lower expenses. However, I/O overhead is the critical obstacle to achieve high system performance in VDI. Reducing I/O overhead in the virtualization environment is not an easy task, because it requires scrutinizing multiple software layers of guest-to-hypervisor and also hypervisor-to-host. In this paper, we propose multilayered cache implementation, called MultiCac
APA, Harvard, Vancouver, ISO, and other styles
19

Fathoni, Muhammad Faris, Seonah Lee, Yoonsoo Kim, Ki-Il Kim, and Kyong Hoon Kim. "Development of Multi-Quadrotor Simulator Based on Real-Time Hypervisor Systems." Drones 5, no. 3 (2021): 59. http://dx.doi.org/10.3390/drones5030059.

Full text
Abstract:
Today, simulator technology has been widely used as an important part of quadrotor development such as validation and testing. A good quadrotor simulator can simulate the quadrotor system as closely as possible to the real one. Therefore, in case of multi-quadrotor simulator, the simulator should not only can simulate a multi-quadrotor system, but also every quadrotor should be able to leverage their own resources. To solve this issues, in this paper, we present a hypervisor-based multi-quadrotor simulator. We used RT-Xen as hypervisor, a real-time Xen hypervisor. To ensure every quadrotor run
APA, Harvard, Vancouver, ISO, and other styles
20

Almutairi, Badr. "Secure mitigation and migration of virtual machines over hybrid cloud hypervisors infrastructure." International Journal of ADVANCED AND APPLIED SCIENCES 8, no. 7 (2021): 7–13. http://dx.doi.org/10.21833/ijaas.2021.07.002.

Full text
Abstract:
As workloads increase in the industry so does the requirement for IT resources. IT companies are now shifting from in-house data centers to cloud-based IT services such as IAAS, PAAS, and SAAS which can offer flexibility at different levels to the developers of the applications working on different projects. Lots of researchers have contributed to migrating virtual machines migration from one cloud service provider to the other in case of backup as a service and other related services. Some of the previous works by some researchers focus on the migration of SAAS and PAAS onto different cloud s
APA, Harvard, Vancouver, ISO, and other styles
21

Pratap, Lokendra, and Mukesh Kumar. "A Forensics Approach for Hypervisor." International Journal of Computer Applications 182, no. 33 (2018): 11–16. http://dx.doi.org/10.5120/ijca2018918267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Kiperberg, Michael, Roee Leon, Amit Resh, Asaf Algawi, and Nezer J. Zaidenberg. "Hypervisor-Based Protection of Code." IEEE Transactions on Information Forensics and Security 14, no. 8 (2019): 2203–16. http://dx.doi.org/10.1109/tifs.2019.2894577.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Yehuda, Raz Ben, Erez Shlingbaum, Yuval Gershfeld, Shaked Tayouri, and Nezer Jacob Zaidenberg. "Hypervisor memory acquisition for ARM." Forensic Science International: Digital Investigation 37 (June 2021): 301106. http://dx.doi.org/10.1016/j.fsidi.2020.301106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

G, Senthil Kumar. "Framework for Hypervisor in Grid." International Journal of Electrical and Electronics Engineering 1, no. 1 (2014): 9–15. http://dx.doi.org/10.14445/23488379/ijeee-v1i1p103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Zmeev, A. "EVALUATING THE RELATIONSHIP BETWEEN THE SIGNIFICANCE OF COMMANDS FOR IMPLEMENTING UNAUTHORIZED ACCESS TO THE HYPERVISOR THROUGH A VM BASED ON FUZZY LOGIC METHODS." Modeling of systems and processes 13, no. 2 (2020): 33–39. http://dx.doi.org/10.12737/2219-0767-2020-13-2-33-39.

Full text
Abstract:
This article describes an approach to using fuzzy logic methods and forming membership functions for criteria of connectivity between the significance of commands and the possibility of unauthorized access to its implementation. Relevant parameters for implementing unauthorized access through a vm or physical network to the hypervisor can be identified based on a specific set of commands, functions, instructions, procedures, utilities, or their parameters, as well as other information about software or hardware, knowledge of which allows the violator to implement each of the current threats of
APA, Harvard, Vancouver, ISO, and other styles
26

Shang, Ming. "A New Hardware Isolation Architecture." Applied Mechanics and Materials 530-531 (February 2014): 631–36. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.631.

Full text
Abstract:
Virtual systems are usually attacked due to the vulnerabilities in the hypervisor. The hypervisor cannot solve this because its code size is too big to implement totally right. This paper proposed a new hardware-software architecture based on hardware isolation, which adds a new component in CPU to provide hard-level isolation. Even when the malicious code gets the highest software privilege, it cannot break into another domain from current domain. This paper also gives the implementation of the booting, memory isolation, scheduling, interrupt handling and inter-domain communication.
APA, Harvard, Vancouver, ISO, and other styles
27

Ambika, M., and Kolasani Ramchand H. Rao. "A Novel Framework for Hypervisor Design." Procedia Computer Science 79 (2016): 190–98. http://dx.doi.org/10.1016/j.procs.2016.03.025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Szefer, Jakub, and Ruby B. Lee. "Architectural support for hypervisor-secure virtualization." ACM SIGARCH Computer Architecture News 40, no. 1 (2012): 437–50. http://dx.doi.org/10.1145/2189750.2151022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Závacký, Pavol, Andrej Eliáš, and Maximilián Stémy. "Hypervisor for Virtualization in Private Cloud." Research Papers Faculty of Materials Science and Technology Slovak University of Technology 23, s1 (2015): 79–84. http://dx.doi.org/10.1515/rput-2015-0030.

Full text
Abstract:
Abstract The article deals with testing and choosing right virtualization platform with management tools for building private cloud, in which methods for power control of virtual machines can be applied. Main brick in every virtualization platform is hypervisor which carries out virtualization and management tools which deliver the services such as web management, storage management and resources management from one place.
APA, Harvard, Vancouver, ISO, and other styles
30

Crespo, A., M. Masmano, J. Coronel, S. Peiró, P. Balbastre, and J. Simó. "Multicore partitioned systems based on hypervisor." IFAC Proceedings Volumes 47, no. 3 (2014): 12293–98. http://dx.doi.org/10.3182/20140824-6-za-1003.02410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Bauman, Erick, Gbadebo Ayoade, and Zhiqiang Lin. "A Survey on Hypervisor-Based Monitoring." ACM Computing Surveys 48, no. 1 (2015): 1–33. http://dx.doi.org/10.1145/2775111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Szefer, Jakub, and Ruby B. Lee. "Architectural support for hypervisor-secure virtualization." ACM SIGPLAN Notices 47, no. 4 (2012): 437–50. http://dx.doi.org/10.1145/2248487.2151022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Suzuki, Yusuke, Shinpei Kato, Hiroshi Yamada, and Kenji Kono. "GPUvm: GPU Virtualization at the Hypervisor." IEEE Transactions on Computers 65, no. 9 (2016): 2752–66. http://dx.doi.org/10.1109/tc.2015.2506582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Spink, Tom, Harry Wagstaff, and Björn Franke. "A Retargetable System-level DBT Hypervisor." ACM Transactions on Computer Systems 36, no. 4 (2020): 1–24. http://dx.doi.org/10.1145/3386161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Leon, Roee S., Michael Kiperberg, Anat Anatey Leon Zabag, Amit Resh, Asaf Algawi, and Nezer J. Zaidenberg. "Hypervisor-Based White Listing of Executables." IEEE Security & Privacy 17, no. 5 (2019): 58–67. http://dx.doi.org/10.1109/msec.2019.2910218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Fattori, Aristide, Andrea Lanzi, Davide Balzarotti, and Engin Kirda. "Hypervisor-based malware protection with AccessMiner." Computers & Security 52 (July 2015): 33–50. http://dx.doi.org/10.1016/j.cose.2015.03.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Alonso, Sara, Jesús Lázaro, Jaime Jiménez, Unai Bidarte, and Leire Muguira. "Evaluating Latency in Multiprocessing Embedded Systems for the Smart Grid." Energies 14, no. 11 (2021): 3322. http://dx.doi.org/10.3390/en14113322.

Full text
Abstract:
Smart grid endpoints need to use two environments within a processing system (PS), one with a Linux-type operating system (OS) using the Arm Cortex-A53 cores for management tasks, and the other with a standalone execution or a real-time OS using the Arm Cortex-R5 cores. The Xen hypervisor and the OpenAMP framework allow this, but they may introduce a delay in the system, and some messages in the smart grid need a latency lower than 3 ms. In this paper, the Linux thread latencies are characterized by the Cyclictest tool. It is shown that when Xen hypervisor is used, this scenario is not suitabl
APA, Harvard, Vancouver, ISO, and other styles
38

Azarmipour, Mahyar, Christian Von Trotha, Ulrich Epple, Zeeshan Ansar, and Caspar Gries. "Realisierung der NAMUR-Diode mittels Virtualisierung." atp magazin 62, no. 5 (2020): 62–67. http://dx.doi.org/10.17560/atp.v62i5.2472.

Full text
Abstract:
Die NAMUR Open Architecture (NOA) verfolgt das Ziel, Vorteile aktueller Automatisierungssysteme, wie beispielsweise hohe Verfügbarkeit, mit Vorteilen von IT-Lösungen zu kombinieren, um so die Flexibilität der Systeme zu erhöhen. Dies geschieht unter besonderer Beachtung der Sicherheitsanforderungen hinsichtlich des systemischen Informationsflusses bzw. der systemischen Kommunikation. Im Rahmen der NOA-Architektur erfolgt dies mittels der NAMUR-Diode. Hier ist der Informationsfluss nur in eine Richtung, nämlich nach außen, erlaubt. In diesem Beitrag wird ein Hypervisor als technologische Grundl
APA, Harvard, Vancouver, ISO, and other styles
39

Mi, Xiang, Wei Ye, and Alei Liang. "Efficient Front-End Cache for XEN Virtual Block Device." Advanced Materials Research 605-607 (December 2012): 2514–17. http://dx.doi.org/10.4028/www.scientific.net/amr.605-607.2514.

Full text
Abstract:
Xen’s VBD (virtual-block-device) driver is proved to be an efficient solution for block device virtualization, which can achieve nearly 90% performance of bare mode. However, long call path, heavy involvement of hypervisor and redundant context-switches are still obstacles preventing current frontend-backend virtual disk driver from reaching a more efficient level. In this paper we proposed a cache-based method to improve the performance of Xen’s VBD driver. By implementing a cache which buffers recent frontend disk requests, guest is given the opportunity to complete read virtual disk indepen
APA, Harvard, Vancouver, ISO, and other styles
40

Nagarajan, Pandeeswari, and Ganeshkumar Perumal. "A Neuro Fuzzy Based Intrusion Detection System for a Cloud Data Center Using Adaptive Learning." Cybernetics and Information Technologies 15, no. 3 (2015): 88–103. http://dx.doi.org/10.1515/cait-2015-0043.

Full text
Abstract:
Abstract With its continuous improvements, the cloud computing system leaves an open door for malicious activities. This promotes the significance of constructing a malware action detection component to discover the anomalies in the virtual environment. Besides, the traditional intrusion detection system does not suit for the cloud environment. So, the proposed scheme develops an anomaly detection system, named Hypervisor Detector at a hypervisor layer to detect the abnormalities in the virtual network. Besides, the fuzzy systems have the ability to detect the presence of uncertain and impreci
APA, Harvard, Vancouver, ISO, and other styles
41

Chang, Hung-Cheng, Bo-Jun Qiu, Jyh-Cheng Chen, et al. "Empirical Experience and Experimental Evaluation of Open5GCore over Hypervisor and Container." Wireless Communications and Mobile Computing 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/6263153.

Full text
Abstract:
One of the most important technologies for future 5G networks is to utilize Network Function Virtualization (NFV) to virtualize the network components. NFV provides flexibility, short time to market, and low cost solution to build network services, which are important features of 5G networks. Although the idea of virtualization is just being applied to cellular networks, it has been used in the community of cloud computing. There are two main virtualization techniques, hypervisor and container. In this paper, we present our practical experience of virtualizing Open5GCore, a commercial product
APA, Harvard, Vancouver, ISO, and other styles
42

Kushwaha, Rahul Singh. "Infra for Automated Hypervisor Environment Set Up." International Journal for Research in Applied Science and Engineering Technology 8, no. 6 (2020): 1066–69. http://dx.doi.org/10.22214/ijraset.2020.6172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Dahlin, Mike, Ryan Johnson, Robert Bellarmine Krug, Michael McCoyd, and William Young. "Toward the Verification of a Simple Hypervisor." Electronic Proceedings in Theoretical Computer Science 70 (October 20, 2011): 28–45. http://dx.doi.org/10.4204/eptcs.70.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Quist, Daniel, Lorie Liebrock, and Joshua Neil. "Improving antivirus accuracy with hypervisor assisted analysis." Journal in Computer Virology 7, no. 2 (2010): 121–31. http://dx.doi.org/10.1007/s11416-010-0142-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Khan, Ashiq, Alf Zugenmaier, Dan Jurca, and Wolfgang Kellerer. "Network virtualization: a hypervisor for the Internet?" IEEE Communications Magazine 50, no. 1 (2012): 136–43. http://dx.doi.org/10.1109/mcom.2012.6122544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Legout, Vincent, and Matthieu Lemerre. "Paravirtualizing Linux in a real-time hypervisor." ACM SIGBED Review 9, no. 2 (2012): 33–37. http://dx.doi.org/10.1145/2318836.2318842.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Ferroni, Matteo, Juan A. Colmenares, Steven Hofmeyr, John D. Kubiatowicz, and Marco D. Santambrogio. "Enabling power-awareness for the Xen hypervisor." ACM SIGBED Review 15, no. 1 (2018): 36–42. http://dx.doi.org/10.1145/3199610.3199615.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Gordeev, A. V., and D. V. Gorelik. "Comparative Testing of Container and Hypervisor Visualizations." Informatsionno-upravliaiushchie sistemy (Information and Control Systems) 2, no. 93 (2018): 60–66. http://dx.doi.org/10.15217/issn1684-8853.2018.2.60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Mishra, Debadatta, Purushottam Kulkarni, and Raju Rangaswami. "Synergy: A Hypervisor Managed Holistic Caching System." IEEE Transactions on Cloud Computing 7, no. 3 (2019): 878–92. http://dx.doi.org/10.1109/tcc.2017.2669033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Carrascosa, E., J. Coronel, M. Masmano, P. Balbastre, and A. Crespo. "XtratuM hypervisor redesign for LEON4 multicore processor." ACM SIGBED Review 11, no. 2 (2014): 27–31. http://dx.doi.org/10.1145/2668138.2668142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!