Intrusion detection techniques in cloud environment: A survey
Security is of paramount importance in this new era of on-demand Cloud Computing.
Researchers have provided a survey on several intrusion detection techniques for detecting …
Researchers have provided a survey on several intrusion detection techniques for detecting …
The ideal versus the real: Revisiting the history of virtual machines and containers
A Randal - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
The common perception in both academic literature and industry today is that virtual
machines offer better security, whereas containers offer better performance. However, a …
machines offer better security, whereas containers offer better performance. However, a …
An updated performance comparison of virtual machines and linux containers
W Felter, A Ferreira, R Rajamony… - 2015 IEEE international …, 2015 - ieeexplore.ieee.org
Cloud computing makes extensive use of virtual machines because they permit workloads to
be isolated from one another and for the resource usage to be somewhat controlled. In this …
be isolated from one another and for the resource usage to be somewhat controlled. In this …
Shape descriptors for non-rigid shapes with a single closed contour
LJ Latecki, R Lakamper… - … IEEE Conference on …, 2000 - ieeexplore.ieee.org
The Core Experiment CE-Shape-1 for shape descriptors performed for the MPEG-7 standard
gave a unique opportunity to compare various shape descriptors for non-rigid shapes with a …
gave a unique opportunity to compare various shape descriptors for non-rigid shapes with a …
Analysis of virtualization technologies for high performance computing environments
AJ Younge, R Henschel, JT Brown… - 2011 IEEE 4th …, 2011 - ieeexplore.ieee.org
As Cloud computing emerges as a dominant paradigm in distributed systems, it is important
to fully understand the underlying technologies that make Clouds possible. One technology …
to fully understand the underlying technologies that make Clouds possible. One technology …
Virtual routers as a service: the routeflow approach leveraging software-defined networks
MR Nascimento, CE Rothenberg… - Proceedings of the 6th …, 2011 - dl.acm.org
The networking equipment market is being transformed by the need for greater openness
and flexibility, not only for research purposes but also for in-house innovation by the …
and flexibility, not only for research purposes but also for in-house innovation by the …
Evaluating machine learning algorithms for anomaly detection in clouds
Critical services in the field of Network Function Virtualization require elaborate reliability
and high availability mechanisms to meet the high service quality requirements. Traditional …
and high availability mechanisms to meet the high service quality requirements. Traditional …
Cloudbench: Experiment automation for cloud environments
The growth in the adoption of cloud computing is driven by distinct and clear benefits for
both cloud customers and cloud providers. However, the increase in the number of cloud …
both cloud customers and cloud providers. However, the increase in the number of cloud …
Vswapper: A memory swapper for virtualized environments
The number of guest virtual machines that can be consolidated on one physical host is
typically limited by the memory size, motivating memory overcommitment. Guests are given …
typically limited by the memory size, motivating memory overcommitment. Guests are given …
E-eco: Performance-aware energy-efficient cloud data center orchestration
The high energy consumption of data centers has been a recurring issue in recent research.
In cloud environments, several techniques are being used that aim for energy efficiency …
In cloud environments, several techniques are being used that aim for energy efficiency …