Survey on cross virtual machine side channel attack detection and properties of cloud computing as sustainable material
KE Narayana, K Jayashree - Materials Today: Proceedings, 2021 - Elsevier
Cloud computing dominates all kinds of computing in the network due to the service-
oriented and on-demand nature of the model. The customer uses a cloud model for fulfilling …
oriented and on-demand nature of the model. The customer uses a cloud model for fulfilling …
An extensive research survey on data integrity and deduplication towards privacy in cloud storage
A Kumar, CP Shantala - International Journal of Electrical and …, 2020 - search.proquest.com
Owing to the highly distributed nature of the cloud storage system, it is one of the
challenging tasks to incorporate a higher degree of security towards the vulnerable data …
challenging tasks to incorporate a higher degree of security towards the vulnerable data …
MMNoC: Embedding memory management units into network-on-chip for lightweight embedded systems
With the advent of the Internet-of-Things (IoT) era, the demand for lightweight embedded
systems is rapidly increasing. So far, ultra-low power (ULP) processors have been leading …
systems is rapidly increasing. So far, ultra-low power (ULP) processors have been leading …
File integrity monitoring tools: Issues, challenges, and solutions
SK Peddoju, H Upadhyay… - … and Computation: Practice …, 2020 - Wiley Online Library
Ensuring integrity of sensitive files in file systems is imperative to computer systems. The
vast majority of attacks work through unapproved or unauthorized access to sensitive files to …
vast majority of attacks work through unapproved or unauthorized access to sensitive files to …
File Integrity Monitoring as a Method for Detecting and Preventing Web Defacement Attacks
C Kurniawan, A Triayudi - Jurnal Online Informatika, 2024 - join.if.uinsgd.ac.id
The cybersecurity landscape in Indonesia recorded an increase in cyberattacks in 2022.
One of the types of attacks observed was web defacement attacks targeting government …
One of the types of attacks observed was web defacement attacks targeting government …
Intelligent On-Off Web Defacement Attacks and Random Monitoring-Based Detection Algorithms
Y Cho - Electronics, 2019 - mdpi.com
Recent cyberattacks armed with various ICT (information and communication technology)
techniques are becoming advanced, sophisticated and intelligent. In security research field …
techniques are becoming advanced, sophisticated and intelligent. In security research field …
A low-overhead kernel object monitoring approach for virtual machine introspection
D Zhan, H Li, L Ye, H Zhang, B Fang… - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
Monitoring kernel object modification of virtual machine is widely used by virtual-machine-
introspection-based security monitors to protect virtual machines in cloud computing, such …
introspection-based security monitors to protect virtual machines in cloud computing, such …
Real-time Container Integrity Monitoring for Large-Scale Kubernetes Cluster
H Kitahara, K Gajananan, Y Watanabe - Journal of Information …, 2021 - jstage.jst.go.jp
Container integrity monitoring is defined as a key requirement for regulatory compliance
such as PCI-DSS, in which any unexpected changes such as file updates or program runs …
such as PCI-DSS, in which any unexpected changes such as file updates or program runs …
Systems and methods for selective patching based on kernel and user space interaction
I Seletskiy, P Boldin - US Patent 11,907,101, 2024 - Google Patents
Disclosed herein are systems and methods for selective patching processes. In one
exemplary aspect, the method includes: identifying, via a user space patching service, a …
exemplary aspect, the method includes: identifying, via a user space patching service, a …
An extensive research survey on data integrity and deduplication towards privacy in cloud storage.
S CP - International Journal of Electrical & Computer …, 2020 - search.ebscohost.com
Owing to the highly distributed nature of the cloud storage system, it is one of the
challenging tasks to incorporate a higher degree of security towards the vulnerable data …
challenging tasks to incorporate a higher degree of security towards the vulnerable data …