Cloud Infrastructures Protection Technique Based on Virtual Machines Live Migration.
Jan FeslVineet GokhaleMarie DolezalovaJirí CehákJan JanecekPublished in: ACIT (2018)
Keyphrases
- virtual machine
- critical infrastructure
- virtual machine monitor
- operating system
- data center
- cloud computing environment
- distributed computing
- computing resources
- multi tenant
- cloud computing
- smart grid
- real time
- low latency
- cyber security
- information security
- multi tasking
- information systems
- optimal allocation
- cloud services
- data sets
- database
- communication systems
- data management
- data mining
- application level
- byte code
- cost effective
- access control