Time-Stealer: A Stealthy Threat for Virtualization Scheduler and Its Countermeasures.
Hong RongMing XianHuimei WangJiangyong ShiPublished in: ICICS (2013)
Keyphrases
- countermeasures
- information security
- resource manager
- operating system
- virtual machine
- cloud computing
- scheduling algorithm
- ibm zenterprise
- power analysis
- storage management
- resource utilization
- rural areas
- security measures
- high availability
- java card
- databases
- real world
- database
- cyber attacks
- traffic accidents
- data center
- software engineering
- information warfare