Results 71 to 80 of about 13,965 (202)
Cloud computing has completely changed IT (information technology) by providing IT resources as services on the internet. However, certain types of attacks, such as interdependency attacks, impede its wide adoption.
Bernard Ousmane Sane +5 more
doaj +1 more source
Robust by design: Designing ICT infrastructures using Twins
Build and update a digital twin of an information and communication infrastructure to simulate how the infrastructure will be attacked. Use the output of the simulations to understand how to improve your infrastructure to defeat the attackers. Abstract Robust‐by‐design (RbD) is a design strategy that uses adversary emulation to strengthen the security ...
Fabrizio Baiardi
wiley +1 more source
DCDIDP: A Distributed, Collaborative, and Data-driven IDP Framework for the Cloud [PDF]
Recent advances in distributed computing, grid computing, virtualization mechanisms, and utility computing led into Cloud Computing as one of the industry buzz words of our decade. As the popularity of the services provided in the cloud environment grows
Joshi, James BD +2 more
core
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone
The rapid evolution of Internet-of-Things (IoT) technologies has led to an emerging need to make it smarter. A variety of applications now run simultaneously on an ARM-based processor.
Baumann A. +9 more
core +1 more source
Enhancing cloud security: A study on ensemble learning‐based intrusion detection systems
The proposed system uses an ensemble learning algorithm. This is a machine learning technique that collects information from weak classifiers and creates one robust classifier with higher accuracy than the weak individual classifiers. Abstract Cloud computing has become an essential technology for people and enterprises due to the simplicity and rapid ...
Maha Al‐Sharif, Anas Bushnag
wiley +1 more source
SGXIO: Generic Trusted I/O Path for Intel SGX
Application security traditionally strongly relies upon security of the underlying operating system. However, operating systems often fall victim to software attacks, compromising security of applications as well.
Anati I. +6 more
core +1 more source
Steam computing paradigm: Cross‐layer solutions over cloud, fog, and edge computing
While fog computing mitigates some of the problems facing the achievement of prospective IoT Cyber Physical Systems (CPS) applications, fog nodes, such as edge data centres, smart gateways, and base stations may not encounter the quality level of future IoT‐ CPS applications in terms of latency, throughput, and energy constraints unless all fog, cloud,
Abir Mchergui +4 more
wiley +1 more source
Full‐mesh VPN performance evaluation for a secure edge‐cloud continuum
Abstract The recent introduction of full‐mesh virtual private network (VPN) solutions which offer near native performance, coupled with modern encryption algorithms and easy scalability as a result of a central control plane have a strong potential to enable the implementation of a seamless edge‐cloud continuum.
Vojdan Kjorveziroski +3 more
wiley +1 more source
The Hypervisors of Safety using Technology of Hardware Virtualization
In the article the approach to construction of system of protection of the information from unapproved access on the basis of program safety hypervisor for the hardware architecture which are not supporting technology of the hardware virtual machine is ...
Vladimir Leonovich Yevseyev +3 more
doaj
Virtualization: an old concept in a new approach [PDF]
Virtualization technology is transforming today’s IT community, offering new possi-bilities to improve the performance and efficiency of IT infrastructure by a dynamic mapping of the PC resources, enabling to run multiple applications and operating ...
Banica, Logica +2 more
core

