On the prevention of Cross-VM cache-based side channel attacks / Zakira Inayat
The state-of-the-art Cloud Computing (CC) has been commercially popular for shared resources of third party applications. A cloud platform enables to share resources among mutually distrusting CC clients and offers cost-effective, on-demand scaling. With the exponential growth of CC environment,...
| Main Author: | Zakira, Inayat |
|---|---|
| Format: | Thesis |
| Published: |
2017
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/8145/ http://studentsrepo.um.edu.my/8145/1/All.pdf http://studentsrepo.um.edu.my/8145/6/zakira.pdf |
Similar Items
Cross-VM Cache-based Side Channel Attacks and Proposed Prevention Mechanisms: A Survey
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
Framework to study the requirements-driven collaboration in agile teams / Irum Inayat
by: Irum, Inayat
Published: (2015)
by: Irum, Inayat
Published: (2015)
On the Security of NOEKEON against Side Channel Cube Attacks
by: Abdul-Latip, S. F., et al.
Published: (2010)
by: Abdul-Latip, S. F., et al.
Published: (2010)
Network performance testing on VM based autonomous web server
by: Mas'ud, M. Zaki, et al.
Published: (2006)
by: Mas'ud, M. Zaki, et al.
Published: (2006)
Preventing persistent cross-site scripting (XSS) attack by applying pattern filtering approach
by: Yusof, Imran, et al.
Published: (2014)
by: Yusof, Imran, et al.
Published: (2014)
An intelligence based model for the prevention of advanced cyber-attacks
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Rough web caching
by: Sulaiman, Sarina, et al.
Published: (2009)
by: Sulaiman, Sarina, et al.
Published: (2009)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
Synthesis and characterisation of PANI/CSA in ammonia detection / Zakira Imana Abu Mansor
by: Abu Mansor, Zakira Imana
Published: (2017)
by: Abu Mansor, Zakira Imana
Published: (2017)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Web caching and prefetching: what, why, and how?
by: Sulaiman, Sarina, et al.
Published: (2008)
by: Sulaiman, Sarina, et al.
Published: (2008)
An efficient VM scheduling algorithm to minimize the makespan and maximize the profit
by: Ibrahim, Aws Fadhil
Published: (2019)
by: Ibrahim, Aws Fadhil
Published: (2019)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Effect of water soaking and low temperature on panicum maximum seed germination / Nur Zakira Naqiyah Zulkefli
by: Zulkefli, Nur Zakira Naqiyah
Published: (2018)
by: Zulkefli, Nur Zakira Naqiyah
Published: (2018)
Intelligent Web caching using neurocomputing and particle swarm optimization algorithm
by: Sulaiman, Sarina, et al.
Published: (2008)
by: Sulaiman, Sarina, et al.
Published: (2008)
Cloud Computing: Locally Sub-Clouds instead of Globally One Cloud
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Rough Set Granularity in Mobile Web Pre-Caching
by: Sulaiman, Sarina, et al.
by: Sulaiman, Sarina, et al.
Implications of caching for JXTA peers
by: Rozlina, Mohamed
Published: (2014)
by: Rozlina, Mohamed
Published: (2014)
Recognition based authentication method to prevent reconstruction attack
by: Koay, Chong Jen
Published: (2018)
by: Koay, Chong Jen
Published: (2018)
A literature review on collaborative caching techniques in MANETs: issues and methods used in serving queries
by: Elfaki, Mohamed, et al.
Published: (2019)
by: Elfaki, Mohamed, et al.
Published: (2019)
Enhancement web proxy cache performance using wrapper feature selection methods with NB and J48
by: Al-Qudah, Dua'a Mahmoud Mohammad, et al.
Published: (2017)
by: Al-Qudah, Dua'a Mahmoud Mohammad, et al.
Published: (2017)
A PROTOTYPE OF STORM WATER CHANNEL IOT (SWCI) TO PREVENT FLOOD DAMAGE IN MALAYSIA
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
Cache-Aware Multi-Core Operating System Scheduler Design
by: Lam, Jun Wei
Published: (2009)
by: Lam, Jun Wei
Published: (2009)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
Software Model Checking For Distributed Applications Using Hybridization Of Centralization And Cache Approaches
by: Hing, Ratana
Published: (2024)
by: Hing, Ratana
Published: (2024)
Weighted one-sided splicing systems
by: Yee, Sian Gang, et al.
Published: (2014)
by: Yee, Sian Gang, et al.
Published: (2014)
Joux multicollisions attack in sponge construction
by: AlAhmad, Mohammad A., et al.
Published: (2013)
by: AlAhmad, Mohammad A., et al.
Published: (2013)
A secure cryptographic algorithm against side channel attacks
by: Abu, Nur Azman, et al.
Published: (2015)
by: Abu, Nur Azman, et al.
Published: (2015)
An Action Arcade Web Based Game-Slime Attack Plus (Slime Invader)
by: Ong, Hui Huang
Published: (2017)
by: Ong, Hui Huang
Published: (2017)
Expert System of Heart Attack Prediction
by: Kayalvily, Tabianan, et al.
Published: (2019)
by: Kayalvily, Tabianan, et al.
Published: (2019)
Simulation System To Educate People On Phivisp Attack
by: Salman, Khairul Anuar
Published: (2023)
by: Salman, Khairul Anuar
Published: (2023)
An Action Arcade Web-Based Game – Slime Attack Plus (Stack-O-Slime)
by: Chan, Hoong Wai
Published: (2017)
by: Chan, Hoong Wai
Published: (2017)
Android Botnets: A Serious Threat to Android Devices
by: Shahid, Anwar, et al.
Published: (2018)
by: Shahid, Anwar, et al.
Published: (2018)
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008)
by: Huo-Chong, Ling, et al.
Published: (2008)
Some properties of probabilistic one-sided sticker systems
by: Selvarajoo, Mathuri, et al.
Published: (2014)
by: Selvarajoo, Mathuri, et al.
Published: (2014)
Types of anti-phishing solutions for phishing attack
by: Siti Hawa, Apandi, et al.
Published: (2020)
by: Siti Hawa, Apandi, et al.
Published: (2020)
Image manipulations analysis and detection methods for reflection-based attacks / Nor Bakiah Abd. Warif
by: Nor Bakiah, Abd. Warif
Published: (2018)
by: Nor Bakiah, Abd. Warif
Published: (2018)
Detection of distributed denial-of-service (DDoS) attack with hyperparameter tuning based on machine learning approach
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
Detection Of Distributed Denial-Of-Service (Ddos) Attack With Hyperparameter Tuning Based On Machine Learning Approach
by: Choo, Yong Han
Published: (2023)
by: Choo, Yong Han
Published: (2023)
Similar Items
-
Cross-VM Cache-based Side Channel Attacks and Proposed Prevention Mechanisms: A Survey
by: Shahid, Anwar, et al.
Published: (2017) -
Framework to study the requirements-driven collaboration in agile teams / Irum Inayat
by: Irum, Inayat
Published: (2015) -
On the Security of NOEKEON against Side Channel Cube Attacks
by: Abdul-Latip, S. F., et al.
Published: (2010) -
Network performance testing on VM based autonomous web server
by: Mas'ud, M. Zaki, et al.
Published: (2006) -
Preventing persistent cross-site scripting (XSS) attack by applying pattern filtering approach
by: Yusof, Imran, et al.
Published: (2014)