Effective way to defend the hypervisor attacks in cloud computing
Nowadays, the organizations are emphasizing on the security and resilient aspect of the cloud computing to protect the privacy and confidentiality of their data information. However, the hypervisor attack remains a hot issue by the cloud user even though enormous research have accomplished to i...
| Main Authors: | Muhammad Shahid, Dildar, Nayeem, Khan, Johari, Abdullah, Adnan, Shahid Khan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2017
|
| Subjects: | |
| Online Access: | http://ir.unimas.my/id/eprint/16230/ http://ir.unimas.my/id/eprint/16230/1/Effective%20Way%20to%20Defend%20the%20Hypervisor%20%28abstract%29.pdf |
Similar Items
Defending Malicious Script Attacks Using Machine
Learning Classifiers
by: Nayeem, Khan, et al.
Published: (2017)
by: Nayeem, Khan, et al.
Published: (2017)
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
Towards Vulnerability Prevention Model for Web Browser
using Interceptor Approach
by: Nayeem, Khan, et al.
Published: (2015)
by: Nayeem, Khan, et al.
Published: (2015)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015)
by: Jaber, Aws Naser, et al.
Published: (2015)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Study of Security Layers Under Attack on Different Layers of Cloud Computing
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Efficient authentication mechanism for defending against reflection-based attacks on domain name system
by: Hasan, Dana, et al.
Published: (2020)
by: Hasan, Dana, et al.
Published: (2020)
Automated system architecture for container- based and hypervisor-based virtualization / Muhammad Amin Abdul Razak
by: Muhammad Amin , Abdul Razak
Published: (2019)
by: Muhammad Amin , Abdul Razak
Published: (2019)
Secure and Efficient Distributed Relay-Based Rekeying Algorithm for Group Communication in Mobile Multihop Relay Network
by: Adnan, Shahid Khan
Published: (2014)
by: Adnan, Shahid Khan
Published: (2014)
Defending against wireless network intrusion
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
Mobile Cloud Computing with SOAP and REST Web Services
by: Ali, Mushtaq, et al.
Published: (2018)
by: Ali, Mushtaq, et al.
Published: (2018)
Cloud Computing: Locally Sub-Clouds instead of Globally One Cloud
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Dilemmas and solutions for Chinese lawyers in defending internet financial crime
by: Xinxin, Mao, et al.
Published: (2024)
by: Xinxin, Mao, et al.
Published: (2024)
Defending Our Chart And Compass
by: Sunday Star, Martin Vebgadesan
Published: (2008)
by: Sunday Star, Martin Vebgadesan
Published: (2008)
Defend our men in blue
by: Abd Razak, Dzulkifli
Published: (2006)
by: Abd Razak, Dzulkifli
Published: (2006)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Neighbor Selection Protocol for Heterogeneous Information Dissemination in Opportunistic Networks
by: Halikul, Lenando, et al.
Published: (2015)
by: Halikul, Lenando, et al.
Published: (2015)
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014)
by: Shahid, Anwar, et al.
Published: (2014)
A study on computer viruses attacks and the way to cure them / Shukor Sanim Mohd Fauzi
by: Mohd Fauzi, Shukor Sanim
Published: (2003)
by: Mohd Fauzi, Shukor Sanim
Published: (2003)
Defending the French language: an online battle?
by: Humphries, Emma
Published: (2017)
by: Humphries, Emma
Published: (2017)
Protecting environmental defenders to prevent pandemics
by: Aruta, John Jamir Benzon R *, et al.
Published: (2022)
by: Aruta, John Jamir Benzon R *, et al.
Published: (2022)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
Cloud computing: cloud adoption in professional practice
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015)
by: Pathan, Al-Sakib Khan
Published: (2015)
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Combating crimes in cyberspace and defending the cybercriminals: the malaysian perspective
by: Mohamed, Duryana
Published: (2009)
by: Mohamed, Duryana
Published: (2009)
Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions
by: Zakira, Inayat, et al.
Published: (2017)
by: Zakira, Inayat, et al.
Published: (2017)
Cloud computing: comparison of various features
by: Khan, Nawsher, et al.
Published: (2011)
by: Khan, Nawsher, et al.
Published: (2011)
Cloud computing: Analysis of various services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Defending Servers Against Naptha Attack By Using An Early Client Authentication Method [TK5105.585. C518 2008 f rb].
by: Cheng, Han Pin
Published: (2008)
by: Cheng, Han Pin
Published: (2008)
The Military's Institutional Teleology: Defending the Common Good
by: Ford, Shannon
Published: (2016)
by: Ford, Shannon
Published: (2016)
The Military's Institutional Teleology: Defending the Common Good
by: Ford, Shannon
Published: (2016)
by: Ford, Shannon
Published: (2016)
Al- Ghazālī’s approach in defending the Islamic faith
by: Abdull Rahman Mahmood,, et al.
Published: (2022)
by: Abdull Rahman Mahmood,, et al.
Published: (2022)
UPM defends paper on Malay maritime history
by: Lee, Benjamin
Published: (2024)
by: Lee, Benjamin
Published: (2024)
International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Malaysias independence must be defended and aid Palestine liberation
by: Ahmad Irfan, Ikmal Hisham
Published: (2022)
by: Ahmad Irfan, Ikmal Hisham
Published: (2022)
Similar Items
-
Defending Malicious Script Attacks Using Machine
Learning Classifiers
by: Nayeem, Khan, et al.
Published: (2017) -
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017) -
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017) -
Towards Vulnerability Prevention Model for Web Browser
using Interceptor Approach
by: Nayeem, Khan, et al.
Published: (2015) -
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015)