"Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment"
written by Gabriel Cephas Obasuyi, Arif Sari,
published by International Journal of Communications, Network and System Sciences, Vol.8 No.7, 2015
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] IMPLEMENTASI HIGH AVAILABILITY SERVER MENGGUNAKAN METODE LOAD BALANCING DAN FAILOVER PADA VIRTUAL WEB SERVER CLUSTER
[2] Securing and Self recovery of Virtual Machines in cloud with an Autonomic Approach using Snapshots
2019
[3] PRODUCTIVITY & QUALITY IMPROVEMENTUSING COMPUTER INTEGRATED MANUFACTURING IN DIE MANUFACTURING INDUSTRY
GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES, 2019
[4] CENTRO DE CIÊNCIAS EXATAS E TECNOLOGIA PROGRAMA DE PÓS-GRADUAÇÃO EM INFORMÁTICA
2019
[5] Desktop Virtualization on different system using Hyper-V
International Journal of Management, Technology And Engineering, 2019
[6] Role of Virtualization Techniques in Cloud Computing Environment
Advances in Computer Communication and Computational Sciences, 2019
[7] Retrospektive Analyse der Ausbreitung und dynamische Erkennung von Web-Tracking durch Sandboxing
2018
[8] Secure Fuzzy Logic to Study the Impact of Knowledge Management Enablers on Organizational Performance through Decision Making Mediator
2018
[9] Enhancing the Hypervisor as a Second Layer of Authentication
Int. Journal of Engineering Research and Application, 2018
[10] Use of Blockchain in Strenghening Cybersecurity And Protecting Privacy
International Journal of Engineering and Information Systems, 2018
[11] Vulnerability Assessment and Penetration Testing of Virtualization
OIC-CERT Journal of Cyber Security, 2018
[12] Innovation of Secure Payment Gateway Principles from Cash to Bitcoin
2018
[13] Comparative Analysis Of Proxmox VE And Xenserver As Type 1 Open Source Based Hypervisors
2018
[14] Computer Centres Resource Cloud Elasticity-Scalability (CRECES): Copperbelt University Case Study
Critical Research on Scalability and Security Issues in Virtual Cloud Environments, 2018
[15] Awareness of Intrusion Detection and Prevention for Virtualized Server Environment in Institutions in Tanzania
2018
[16] C-DIDS: A Cooperative and Distributed Intrusion Detection System in Cloud environment
2018
[17] A Study on Resource Pooling, Allocation and Virtualization Tools used for Cloud Computing
International Journal of Computer Applications, 2017
[18] A Novel Approach for Dynamic Apportion and De-Allocate Resources from the Cloud
International Journal of Emerging Research inManagement & Technology, 2017
[19] To Implement Server Virtualization and Consolidation Using 2P-Cloud Architecture
2017
[20] Hypervisor based performance characterization: XEN/KVM
2017 2nd International Conference on Telecommunication and Networks (TEL-NET), 2017
[21] Virtual machine security
International Journal of Information and Computer Security, 2017
[22] Virtual Machine Placement using Enhanced Scheduling and Load Rebalancing using Hybrid Algorithms Based on Multi-Dimensional Resource Characteristics in Cloud Computing Systems
International Journal for Scientific Research & Development, 2016
[23] VIRTUAL MACHINE PLACEMENT AND LOAD REBALANCING ALGORITHMS IN CLOUD COMPUTING SYSTEMS
INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY, 2016
[24] Security Challenges of Virtualization in Cloud Computing
ICTCS 2016 Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, 2016
[25] Extension of Kerberos with X. 509 and Integration of Elliptic Curve Cryptography in Authentication
2016
[26] Optimized Algorithms for Virtual Machine Placement based on Multi-Dimensional Resource Characteristics in Cloud Computing Systems
International Journal of Computational Intelligence and Informatics, 2016
[27] Security and Optimization Challenges of Green Data Centers
International Journal of Communications, Network and System Sciences, 2015
[28] Fault Tolerance Mechanisms in Distributed Systems
International Journal of Communications, Network and System Sciences, 2015
[29] Comparative Analysis of Wireless Security Protocols: WEP vs WPA
International Journal of Communications, Network and System Sciences, 2015
[30] Review of the Security Issues in Vehicular Ad Hoc Networks (VANET)
2015
[31] Dissemination of Information Communication Technologies: Mobile Government Practices in Developing States
International Journal of Communications, Network and System Sciences, 2015
[32] Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
International Journal of Communications, Network and System Sciences, 2015
[33] Collision Avoidance in Mobile Wireless Ad-Hoc Networks with Enhanced MACAW Protocol Suite
International Journal of Communications, Network and System Sciences, 2015