VMMISD: An Efficient Load Balancing Model for Virtual Machine Migrations via Fused Metaheuristics With Iterative Security Measures and Deep Learning …

MG Brahmam, RV Anand - IEEE Access, 2024 - ieeexplore.ieee.org
As cloud computing continues to evolve, the need for efficient and secure management of
virtual machine (VM) migrations has become increasingly evident. Traditional models often …

When agile security meets 5G

GHS Carvalho, I Woungang, A Anpalagan… - IEEE Access, 2020 - ieeexplore.ieee.org
5G is a critical infrastructure that will connect the whole society and bridge other critical
infrastructure systems. Thus, cybersecurity emerges as crucial tenet within the 5G pathway …

High throughput vms placement with constrained communication overhead and provable guarantees

I Cohen, G Einziger, M Goldstein… - … on Network and …, 2023 - ieeexplore.ieee.org
Placement of VMs in the cloud is one of the most fundamental problems in systems
research. Traditionally, placement algorithms assume that the schedulers have complete …

Optimal security risk management mechanism for the 5G cloudified infrastructure

GHS Carvalho, I Woungang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This work proposes an optimal security risk management mechanism to holistically minimize
the risks of a Denial of Service (DoS) attack and Service Level Agreement (SLA) violations …

A REST-Based Framework for Performability Management of Service Function Chains

M Di Mauro, G Galatro, M Longo… - 2023 13th …, 2023 - ieeexplore.ieee.org
We propose a REST-based architecture to manage performability aspects of service function
chains (SFCs) which represent crucial features of cloud-native 5G networks. In particular …

Implementation of Network Security Using a Cloud Computing-Based Firewall on the PukulEnam Company Website

WJ Wisesa, HH Nuha, RG Utomo - 2023 3rd International …, 2023 - ieeexplore.ieee.org
In our modern digital landscape, websites serve as the primary means for individuals and
organizations to communicate and share information online. However, this convenience …

Blockchain-Based Access Control with Decentralized Architecture for Data Storage and Transfer

V Vanjipriya, A Suresh - International Conference On Innovative …, 2023 - Springer
When it comes to the security of data in the cloud storage model, access control is the most
crucial factor. However, traditional methods of data sharing and access control present …

Ζητήματα ασφάλειας στο cloud computing

Α Χατζηχαραλάμπους - dspace.lib.uom.gr
Ο βασικός σκοπός της εργασίας είναι να διερευνήσει, να αναλύσει και να κατανοήσει τα
ζητήματα ασφαλείας που σχετίζονται με το cloud computing. Αυτό περιλαμβάνει την εξέταση …

[PDF][PDF] Security Risk-Aware Resource Management Mechanism for the 5G Cloudified Infrastructure

GHS Carvalho - 2021 - rshare.library.torontomu.ca
Abstract 5G wireless networks will play a critical role in society by providing ubiquitous
access to end users, supporting mission critical applications, and interconnecting other …

[PDF][PDF] A SELECTIVITY AND IP MONITORING AS COMPLEMENTARY DEFENCES for DDoS PROTECTION TO CLOUD SERVICES

R SIVASANKAR, M MARIKKANNAN, M ARUN - ijirse.com
ABSTRACT Circulated Denial-of-Service (DDoS) is turning out to be an even more
perplexing issue with the relocation of these services and applications to shared and …