Results 51 to 60 of about 13,965 (202)

Positional Packet Capture for Anomaly Detection in Multitenant Virtual Networks

open access: yesInternational Journal of Network Management, Volume 35, Issue 2, March/April 2025.
ABSTRACT Anomaly detection in multitenant virtual networks presents significant challenges due to the dynamic, ephemeral nature of virtualized environments and the complex traffic patterns they generate. This paper presents a definition of preferable positions within virtual networks to enhance anomaly detection efficacy.
Daniel Spiekermann
wiley   +1 more source

DESAIN DAN ANALISIS KINERJA VIRTUALISASI SERVER MENGGUNAKAN PROXMOX VIRTUAL ENVIRONTMENT

open access: yesJurnal Komputer Terapan, 2015
Teknologi virtualisasi merupakan topik yang mulai ramai diteliti oleh para peneliti. Hal tersebut tidak terlepas dari kemampuan teknologi tersebut dalam memangkas biaya penyediaan infrastruktur dan operasional secara mandiri bagi setiap servis yang akan ...
Budi Harijanto, Yuri Ariyanto
doaj  

A Secure System Architecture for Measuring Instruments in Legal Metrology

open access: yesComputers, 2015
Embedded systems show the tendency of becoming more and more connected. This fact combined with the trend towards the Internet of Things, from which measuring instruments are not immune (e.g., smart meters), lets one assume that security in measuring ...
Daniel Peters   +3 more
doaj   +1 more source

Enhancing Security and Performance in Live VM Migration: A Machine Learning‐Driven Framework With Selective Encryption for Enhanced Security and Performance in Cloud Computing Environments

open access: yesExpert Systems, Volume 42, Issue 2, February 2025.
ABSTRACT Live virtual machine (LVM) migration is pivotal in cloud computing for its ability to seamlessly transfer virtual machines (VMs) between physical hosts, optimise resource utilisation, and enable uninterrupted service. However, concerns persist regarding safeguarding sensitive data during migration, particularly in critical sectors like ...
Raseena M. Haris   +4 more
wiley   +1 more source

A Prioritised Traffic Embedding Mechanism enabling a Public Safety Virtual Operator

open access: yes, 2015
Public Protection and Distaster Relief (PPDR) services can benefit greatly from the availability of mobile broadband communications in disaster and emergency scenarios.
Ahmadi, Hamed   +3 more
core   +1 more source

Hypervisor-based fault tolerance [PDF]

open access: yesACM SIGOPS Operating Systems Review, 1995
Protocols to implement a fault-tolerant computing system are described. These protocols augment the hypervisor of a virtual-machine manager and coordinate a primary virtual machine with its backup. No modifications to the hardware, operating system, or application programs are required.
Thomas C. Bressoud, Fred B. Schneider
openaire   +1 more source

A comprehensive survey on software‐defined networking for smart communities

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 1, 10 January 2025.
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary   +3 more
wiley   +1 more source

Simulators for Processors Used in Virtualization: A Survey

open access: yesIEEE Open Journal of the Computer Society
Simulation imitates the modeled system to the desired level of details in the desired time. Cloud computing shares the resources, and virtualization is the key technology that enables cloud computing.
Swapneel C. Mhatre, Priya Chandran
doaj   +1 more source

A Neuro Fuzzy Based Intrusion Detection System for a Cloud Data Center Using Adaptive Learning

open access: yesCybernetics and Information Technologies, 2015
With its continuous improvements, the cloud computing system leaves an open door for malicious activities. This promotes the significance of constructing a malware action detection component to discover the anomalies in the virtual environment.
Nagarajan Pandeeswari   +1 more
doaj   +1 more source

IMPROVING THE EFFICIENCY OF MASTERING DISTRIBUTED INFORMATION SYSTEMS IN A VIRTUAL COMPUTER LAB BASED ON THE USE OF CONTAINERIZATION AND CONTAINER ORCHESTRATION TECHNOLOGIES

open access: yesСовременные информационные технологии и IT-образование, 2018
This article discusses issues surrounding the training of specialists in distributed information systems using innovative methods and technologies in a virtual computer lab environment with an integrated knowledge management system.
Mikhail A. Belov   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy