Journal articles on the topic 'Virtual machines security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Virtual machines security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bellovin, Steven M. "Virtual machines, virtual security?" Communications of the ACM 49, no. 10 (2006): 104. http://dx.doi.org/10.1145/1164394.1164414.
Full textFarhan, Mansoor, Kashif Saghar Dr., Uddin Agha Shahab, and Rehmat Sabir. "Virtual Machine's Network Security." LC International Journal of STEM 4, no. 3 (2023): 99–127. https://doi.org/10.5281/zenodo.10185182.
Full textWu, Jing, Feng Zhi Zhao, and Yu Dan Dong. "Design on Virtual Machine Frame of Cloud Computing Platform." Advanced Materials Research 834-836 (October 2013): 1832–35. http://dx.doi.org/10.4028/www.scientific.net/amr.834-836.1832.
Full textMattsson, Ulf. "Real security for virtual machines." Network Security 2009, no. 4 (2009): 15–17. http://dx.doi.org/10.1016/s1353-4858(09)70041-8.
Full textChen, Ke Ming. "Design on Framework for Dynamic Monitoring of Virtual Machines." Applied Mechanics and Materials 530-531 (February 2014): 667–70. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.667.
Full textDina, Mohsen Zoughbi, and Dutta Nitul. "Hypervisor Vulnerabilities and Some Defense Mechanisms, in Cloud Computing Environment." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 10, no. 2 (2020): 42–48. https://doi.org/10.5281/zenodo.5835945.
Full textRaghavendran, R., and B. Ragupathi. "Update Checker: Increasing Virtual Machine Security in Cloud Environments." Applied Mechanics and Materials 513-517 (February 2014): 1268–73. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1268.
Full textZhang, Ruirui, and Xin Xiao. "Study of Immune-Based Intrusion Detection Technology in Virtual Machines for Cloud Computing Environment." Mobile Information Systems 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/2301970.
Full textLiu, Zongyuan, Sergei Stepanenko, Jean Pichon-Pharabod, Amin Timany, Aslan Askarov, and Lars Birkedal. "VMSL: A Separation Logic for Mechanised Robust Safety of Virtual Machines Communicating above FF-A." Proceedings of the ACM on Programming Languages 7, PLDI (2023): 1438–62. http://dx.doi.org/10.1145/3591279.
Full textRachana, S. C., and H. S. Guruprasad. "Virtual Machine Introspection." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 06 (2014): 860–67. https://doi.org/10.5281/zenodo.14742634.
Full textHetzelt, Felicitas, and Robert Buhren. "Security Analysis of Encrypted Virtual Machines." ACM SIGPLAN Notices 52, no. 7 (2017): 129–42. http://dx.doi.org/10.1145/3140607.3050763.
Full textEngland, Paul, and John Manferdelli. "Virtual machines for enterprise desktop security." Information Security Technical Report 11, no. 4 (2006): 193–202. http://dx.doi.org/10.1016/j.istr.2006.09.001.
Full textZoughbi, Dina Mohsen, and Nitul Dutta. "Hypervisor Vulnerabilities and Some Defense Mechanisms, in Cloud Computing Environment." International Journal of Innovative Technology and Exploring Engineering 10, no. 2 (2020): 42–48. http://dx.doi.org/10.35940/ijitee.b8262.1210220.
Full textAnitha, H. M., and P. Jayarekha. "An Software Defined Network Based Secured Model for Malicious Virtual Machine Detection in Cloud Environment." Journal of Computational and Theoretical Nanoscience 17, no. 1 (2020): 526–30. http://dx.doi.org/10.1166/jctn.2020.8481.
Full textHasan, Waqas. "Virtual Machine Migration in Cloud Computing." Oriental journal of computer science and technology 14, no. 010203 (2022): 46–51. http://dx.doi.org/10.13005/ojcst14.010203.06.
Full textSanchez Rubio, Manuel, German Lopez Civera, and Jose Javier Martinez Herraiz. "Automatic Generation Of Virtual Machines For Security Training." IEEE Latin America Transactions 14, no. 6 (2016): 2795–800. http://dx.doi.org/10.1109/tla.2016.7555257.
Full textResearcher. "IMPROVING SECURITY FOR VIRTUAL MACHINES IN CLOUD VIRTUALIZATION." International Journal of Computer Engineering and Technology (IJCET) 15, no. 5 (2024): 351–65. https://doi.org/10.5281/zenodo.13828259.
Full textKamoun-Abid, Ferdaous, Hounaida Frikha, Amel Meddeb-Makhoulf, and Faouzi Zarai. "Automating cloud virtual machines allocation via machine learning." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 1 (2024): 191. http://dx.doi.org/10.11591/ijeecs.v35.i1.pp191-202.
Full textFerdaous, Kamoun-Abid Hounaida Frikha Amel Meddeb-Makhoulf Faouzi Zarai. "Automating cloud virtual machines allocation via machine learning." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 1 (2024): 191–202. https://doi.org/10.11591/ijeecs.v35.i1.pp191-202.
Full textChen, Ji-Ming, Shi Chen, Xiang Wang, Lin Lin, and Li Wang. "A Virtual Machine Migration Strategy Based on the Relevance of Services against Side-Channel Attacks." Security and Communication Networks 2021 (December 21, 2021): 1–17. http://dx.doi.org/10.1155/2021/2729949.
Full textHasan, Waqas. "A Survey on Virtual Machine Migration in Cloud Computing." International Journal of Scientific & Engineering Research 13, no. 03 (2022): 648–53. http://dx.doi.org/10.14299/ijser.2022.03.03.
Full textAlly, Said. "Assessment of Web Security Vulnerabilities for Common Open Source Virtualization Software." Tanzania Journal of Engineering and Technology 43, no. 2 (2024): 92–107. http://dx.doi.org/10.52339/tjet.v43i2.925.
Full textCheong, Il Ahn, Seul Gi Lee, and Kyung Ho Son. "A Study on the Virtualization Security Management in the Cloud Computing Environment." Applied Mechanics and Materials 336-338 (July 2013): 2035–39. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2035.
Full textTupakula, U. K., and V. Varadharajan. "Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines." Computer Journal 55, no. 4 (2011): 397–409. http://dx.doi.org/10.1093/comjnl/bxr084.
Full textRen, Xun Yi, and Yang Yu. "SELinux-Based Secure Server Virtualization." Advanced Materials Research 756-759 (September 2013): 2829–33. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2829.
Full textV. Samuel Blessed Nayagam, P., and A. Shajin Nargunam. "Secure Data Verification and Virtual Machine Monitoring." International Journal of Engineering & Technology 7, no. 4.36 (2018): 574. http://dx.doi.org/10.14419/ijet.v7i4.36.24140.
Full textSzuster, Marcin, and Bartłomiej Kozioł. "Hidden Security Breaches in Automatic Control of Technological Processes." Pomiary Automatyka Robotyka 25, no. 2 (2021): 31–39. http://dx.doi.org/10.14313/par_240/31.
Full textN, Saravanan, and Umamakeswari A. "Security Vulnerabilities of Virtualization Technique." International Journal of Engineering & Technology 7, no. 2.24 (2018): 478. http://dx.doi.org/10.14419/ijet.v7i2.24.12140.
Full textDong, Jian, Hui Zhu, Chao Song, Qiang Li, and Rui Xiao. "Task-Oriented Multilevel Cooperative Access Control Scheme for Environment with Virtualization and IoT." Wireless Communications and Mobile Computing 2018 (July 10, 2018): 1–11. http://dx.doi.org/10.1155/2018/5938152.
Full textZardari, Munwar Ali, and Low Tang Jung. "Classification of File Data Based on Confidentiality in Cloud Computing using K-NN Classifier." International Journal of Business Analytics 3, no. 2 (2016): 61–78. http://dx.doi.org/10.4018/ijban.2016040104.
Full textAshraf, Zeeshan, Adnan Sohail, and Muddesar Iqbal. "Design and Implementation of Lightweight Certificateless Secure Communication Scheme on Industrial NFV-Based IPv6 Virtual Networks." Electronics 13, no. 13 (2024): 2649. http://dx.doi.org/10.3390/electronics13132649.
Full textNemirajaiah, Naveen Kumar Adalagere, and Channa Krishna Raju. "Securing Virtual Machines using Cloning in Cloud Services." Engineering, Technology & Applied Science Research 15, no. 2 (2025): 20770–75. https://doi.org/10.48084/etasr.9391.
Full textShambhu, Prasad Sah* Sanjeev Kumar Panjiyar Purushottam Das Ankur Singh Bist. "CLOUD RESOURCE VIRTUALIZATION TOWARDS SECURITY." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 5 (2016): 305–9. https://doi.org/10.5281/zenodo.51427.
Full textBhansali, Aayushi. "Cloud Security and Privacy." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 1539–42. http://dx.doi.org/10.22214/ijraset.2023.55416.
Full textE. C., ONUOHA, and AKOMOLAFE O. P. "INTER-AGENT COORDINATED SECURITY MODEL FOR CLOUD BASED VIRTUAL MACHINES." i-manager’s Journal on Cloud Computing 5, no. 2 (2018): 11. http://dx.doi.org/10.26634/jcc.5.2.15688.
Full textShu, Zhaogang, Xiangmin Ji, and Yaohua Lin. "A hybrid security model for virtual machines in cloud environment." International Journal of Autonomous and Adaptive Communications Systems 10, no. 2 (2017): 236. http://dx.doi.org/10.1504/ijaacs.2017.084714.
Full textShu, Zhaogang, Yaohua Lin, and Xiangmin Ji. "A hybrid security model for virtual machines in cloud environment." International Journal of Autonomous and Adaptive Communications Systems 10, no. 2 (2017): 236. http://dx.doi.org/10.1504/ijaacs.2017.10005571.
Full textZhang, Fengzhe, and Haibo Chen. "Security-Preserving Live Migration of Virtual Machines in the Cloud." Journal of Network and Systems Management 21, no. 4 (2012): 562–87. http://dx.doi.org/10.1007/s10922-012-9253-1.
Full textJyothi, G., Ch V. Bhargavi, G. Mani, Ch Usha Kumari, and E. Laxmi Lydia. "Analysis of Various Security Methods of Virtual Machines in Cloud Computing." Journal of Computational and Theoretical Nanoscience 17, no. 12 (2020): 5368–77. http://dx.doi.org/10.1166/jctn.2020.9430.
Full textLasota, Krzysztof, and Adam Kozakiewicz. "Model of User Access Control to Virtual Machines Based on RT-Family Trust Management Language with Temporal Validity Constraints – Practical Application." Journal of Telecommunications and Information Technology, no. 3 (September 30, 2012): 13–21. http://dx.doi.org/10.26636/jtit.2012.3.1274.
Full textTYMOSHCHUK, Dmytro, and Vasyl YATSKIV. "USING HYPERVISORS TO CREATE A CYBER POLYGON." MEASURING AND COMPUTING DEVICES IN TECHNOLOGICAL PROCESSES, no. 3 (August 29, 2024): 52–56. http://dx.doi.org/10.31891/2219-9365-2024-79-7.
Full textSubramanian N., Dr Venkata, and Dr Shankar Sriram V S. "Mitigating DDoS Attacks in Virtual Machine Migration: An In-Depth Security Framework Utilizing Deep Learning and Advanced Encryption Techniques." International Journal of Innovative Technology and Exploring Engineering 14, no. 2 (2025): 12–20. https://doi.org/10.35940/ijitee.b1032.14020125.
Full textDr., Venkata Subramanian N. "Mitigating DDoS Attacks in Virtual Machine Migration: An In-Depth Security Framework Utilizing Deep Learning and Advanced Encryption Techniques." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 14, no. 2 (2025): 12–20. https://doi.org/10.35940/ijitee.B1032.14020125.
Full textChandrakala, N., and B. Thirumala Rao. "Migration of Virtual Machine to improve the Security of Cloud Computing." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 1 (2018): 210. http://dx.doi.org/10.11591/ijece.v8i1.pp210-219.
Full textN., Chandrakala, and Thirumala Rao B. "Migration of Virtual Machine to improve the Security in Cloud Computing." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 1 (2018): 210–19. https://doi.org/10.11591/ijece.v8i1.pp210-219.
Full textMichael, N. Aliguay, and I. Teleron Jerry. "Revolutionizing Computational Efficiency: A Comprehensive Analysis of Virtual Machine Optimization Strategies." Engineering and Technology Journal 9, no. 05 (2024): 4121–26. https://doi.org/10.5281/zenodo.11367817.
Full textWilczyński, Andrzej. "Using Polymatrix Extensive Stackelberg Games in Security – Aware Resource Allocation and Task Scheduling in Computational Clouds." Journal of Telecommunications and Information Technology, no. 1 (March 30, 2017): 71–80. http://dx.doi.org/10.26636/jtit.2017.1.653.
Full textZhou, Huaizhe, Haihe Ba, Yongjun Wang, et al. "Tenant-Oriented Monitoring for Customized Security Services in the Cloud." Symmetry 11, no. 2 (2019): 252. http://dx.doi.org/10.3390/sym11020252.
Full textSaeed, Hadeel Amjed, Sufyan T. Faraj Al-Janabi, Esam Taha Yassen, and Omar A. Aldhaibani. "Survey on Secure Scientific Workflow Scheduling in Cloud Environments." Future Internet 17, no. 2 (2025): 51. https://doi.org/10.3390/fi17020051.
Full textAlthobaiti, Ahmad Fayez S. "Analyzing Security Threats to Virtual Machines Monitor in Cloud Computing Environment." Journal of Information Security 08, no. 01 (2017): 1–7. http://dx.doi.org/10.4236/jis.2017.81001.
Full text