Results 1 to 10 of about 373,798 (281)
Virtual numbers for virtual machines? [PDF]
Knowing the number of virtual machines (VMs) that a cloud physical hardware can (further) support is critical as it has implications on provisioning and hardware procurement. However, current methods for estimating the maximum number of VMs possible on a
Ko, Ryan K.L. +2 more
core +4 more sources
An incremental anomaly detection model for virtual machines. [PDF]
Self-Organizing Map (SOM) algorithm as an unsupervised learning method has been applied in anomaly detection due to its capabilities of self-organizing and automatic anomaly prediction. However, because of the algorithm is initialized in random, it takes
Hancui Zhang +4 more
doaj +2 more sources
A Virtual Machine Dynamic Migration Method Based on Redundant Transition [PDF]
In 5G core network virtualization environment, the virtual machines sharing the same physical server brings a series of problems,such as Side-Channel Attack(SCA),Virtual Node Escape Attack(VNEA) and so on,causing user private information disclosure.The ...
SUN Zhiyong, JI Xinsheng, YOU Wei, LI Yingle
doaj +1 more source
Virtual Machine Introspection [PDF]
Cyberattacks targeted at virtualization infrastructure\ud underlying cloud computing services has become increasingly\ud sophisticated. This paper presents a novel malware and rookit detection\ud system which protects the guests against different attacks.\ud It combines system call monitoring and system call hashing on the\ud guest kernel together with
Win, Thu Yein +4 more
openaire +1 more source
Study of the Kinetics of Adhesive Bond Formation Using the Ultrasonic Method
Adhesive bonding is widely used in modern industry. It has many advantages—the main one being the reduction in production costs. It also has certain limitations.
Jakub Kowalczyk +4 more
doaj +1 more source
Non-destructive ultrasonic testing can be used to assess the properties and condition of real machine elements during their operation, with limited (one-sided) access to these elements.
Jakub Kowalczyk +4 more
doaj +1 more source
Research on dynamic migration of critical virtual machines for multi-tenancy
A dynamic migration method of critical virtual machines for multi-tenancy was proposed.Firstly,the tenants can set ratio of critical virtual machines according to tenant's security requirements,then the dynamic migration frequency of virtual machines ...
Shuo ZHAO +3 more
doaj +3 more sources
Data Center Enhancement by Server Resources Utilization [PDF]
Data centers are the main nerve of the Internet because of its hosting, storage, cloud computing and other services. All these services require a lot of work and resources, such as energy and cooling.
Haider A. Ghanem +2 more
doaj +1 more source
VMI-based virtual machine remote attestation scheme
The virtual machine attestation scheme proposed by trusted computing group (TCG) can provide attestation service of virtual machine for cloud computing.However,the service using the scheme proposed by the TCG directly would be threatened by the cuckoo ...
Wei WANG +3 more
doaj +3 more sources
Mitigating Virtualization Failures Through Migration to a Co-Located Hypervisor
Many organizations are moving their systems to the cloud, where providers consolidate multiple clients using virtualization, which creates challenges to business-critical applications.
Frederico Cerveira +2 more
doaj +1 more source

