[1]
|
An analysis of Approaches for Desktop Virtualization and Challenges
International Journal of Scientific Research in Science and Technology,
2021
DOI:10.32628/CSEIT2174133
|
|
|
[2]
|
A Review on Cloud Computing services, concerns, and security risk awareness in the context of Digital Transformation
2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM),
2021
DOI:10.1109/SEEDA-CECNSM53056.2021.9566267
|
|
|
[3]
|
Security Aspects of Virtualization and Its Impact on Business Information Security
2020 International Conference on Information Science and Communication Technology (ICISCT),
2020
DOI:10.1109/ICISCT49550.2020.9080029
|
|
|
[4]
|
Securing and Self recovery of Virtual Machines in cloud with an Autonomic Approach using Snapshots
Mobile Networks and Applications,
2019
DOI:10.1007/s11036-019-01261-3
|
|
|
[5]
|
Awareness of Intrusion Detection and Prevention for Virtualized Server Environment in Institutions in Tanzania
2018 4th International Conference on Computational Intelligence & Communication Technology (CICT),
2018
DOI:10.1109/CIACT.2018.8480143
|
|
|
[6]
|
C-DIDS: A Cooperative and Distributed Intrusion Detection System in Cloud environment
2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC),
2018
DOI:10.1109/IWCMC.2018.8450478
|
|
|
[7]
|
Critical Research on Scalability and Security Issues in Virtual Cloud Environments
Advances in Information Security, Privacy, and Ethics,
2018
DOI:10.4018/978-1-5225-3029-9.ch003
|
|
|
[8]
|
Hypervisor based performance characterization: XEN/KVM
2017 2nd International Conference on Telecommunication and Networks (TEL-NET),
2017
DOI:10.1109/TEL-NET.2017.8343570
|
|
|
[9]
|
Security Challenges of Virtualization in Cloud Computing
Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies - ICTCS '16,
2016
DOI:10.1145/2905055.2905315
|
|
|
[10]
|
Extension of Kerberos with X.509 and Integration of Elliptic Curve Cryptography in Authentication
International Journal of Communications, Network and System Sciences,
2016
DOI:10.4236/ijcns.2016.912046
|
|
|
[11]
|
Security Challenges of Virtualization in Cloud Computing
Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies,
2016
DOI:10.1145/2905055.2905315
|
|
|
[12]
|
Security and Optimization Challenges of Green Data Centers
International Journal of Communications, Network and System Sciences,
2015
DOI:10.4236/ijcns.2015.812044
|
|
|
[13]
|
Dissemination of Information Communication Technologies: Mobile Government Practices in Developing States
International Journal of Communications, Network and System Sciences,
2015
DOI:10.4236/ijcns.2015.813049
|
|
|
[14]
|
Comparative Analysis of Wireless Security Protocols: WEP vs WPA
International Journal of Communications, Network and System Sciences,
2015
DOI:10.4236/ijcns.2015.812043
|
|
|
[15]
|
Collision Avoidance in Mobile Wireless Ad-Hoc Networks with Enhanced MACAW Protocol Suite
International Journal of Communications, Network and System Sciences,
2015
DOI:10.4236/ijcns.2015.813048
|
|
|
[16]
|
Fault Tolerance Mechanisms in Distributed Systems
International Journal of Communications, Network and System Sciences,
2015
DOI:10.4236/ijcns.2015.812042
|
|
|
[17]
|
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
International Journal of Communications, Network and System Sciences,
2015
DOI:10.4236/ijcns.2015.813051
|
|
|
[18]
|
Review of the Security Issues in Vehicular Ad Hoc Networks (VANET)
International Journal of Communications, Network and System Sciences,
2015
DOI:10.4236/ijcns.2015.813050
|
|
|