A survey on resiliency techniques in cloud computing infrastructures and applications
C Colman-Meixner, C Develder… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
Today's businesses increasingly rely on cloud computing, which brings both great
opportunities and challenges. One of the critical challenges is resiliency: disruptions due to …
opportunities and challenges. One of the critical challenges is resiliency: disruptions due to …
On resilience in cloud computing: A survey of techniques across the cloud domain
T Welsh, E Benkhelifa - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Cloud infrastructures are highly favoured as a computing delivery model worldwide, creating
a strong societal dependence. It is therefore vital to enhance their resilience, providing …
a strong societal dependence. It is therefore vital to enhance their resilience, providing …
Systematic identification of threats in the cloud: A survey
When a vulnerability is discovered in a system, some key questions often asked by the
security analyst are what threat (s) does it pose, what attacks may exploit it, and which parts …
security analyst are what threat (s) does it pose, what attacks may exploit it, and which parts …
Managed containers: A framework for resilient containerized mission critical systems
XM Aguilera, C Otero, M Ridley… - 2018 IEEE 11th …, 2018 - ieeexplore.ieee.org
Traditional defense mechanisms are insufficient for protecting containerized mission critical
systems. These systems are mostly based on cloud-based images (eg, Docker) that need to …
systems. These systems are mostly based on cloud-based images (eg, Docker) that need to …
SecIngress: an API gateway framework to secure cloud applications based on N-variant system
D Zhou, H Chen, G Cheng, W He… - China Communications, 2021 - ieeexplore.ieee.org
Based on the diversified technology and the cross-validation mechanism, the N-variant
system provides a secure service architecture for cloud providers to protect the cloud …
system provides a secure service architecture for cloud providers to protect the cloud …
Protecting critical cloud infrastructures with predictive capability
SS Yau, AB Buduru, V Nagaraja - 2015 IEEE 8th International …, 2015 - ieeexplore.ieee.org
Emerging trends in cyber system security breaches, including those in critical infrastructures
involving cloud systems, such as in applications of military, homeland security, finance …
involving cloud systems, such as in applications of military, homeland security, finance …
[HTML][HTML] An automated consistency management approach for a privacy-aware electric vehicle architecture
J Stancke, C Plappert, L Jäger - Microprocessors and Microsystems, 2024 - Elsevier
Modern vehicles contain a number of highly connected embedded systems that generate,
store, and process information and exchange it with their environment. Since a large part of …
store, and process information and exchange it with their environment. Since a large part of …
Towards a privacy-aware electric vehicle architecture
C Plappert, J Stancke, L Jäger - 2022 30th Euromicro …, 2022 - ieeexplore.ieee.org
Connected vehicles need to generate, store, process, and exchange a multitude of
information with their environment. Much of this information is privacy-critical and thus …
information with their environment. Much of this information is privacy-critical and thus …
nm-variant systems: Adversarial-resistant software rejuvenation for cloud-based web applications
Web servers are a popular target for adversaries as they are publicly accessible and often
vulnerable to compromise. Compromises can go unnoticed for months, if not years, and …
vulnerable to compromise. Compromises can go unnoticed for months, if not years, and …
Secure data communication in client-cloud environment: A survey
The use of cloud computing platform is growing now days. It is used in all the area of
Education, Business, Web Domain and Data Servers. The developing interest is a direct …
Education, Business, Web Domain and Data Servers. The developing interest is a direct …