Login / Signup
Interdependency Attack-Aware Secure and Performant Virtual Machine Allocation Policies With Low Attack Efficiency and Coverage.
Bernard Ousmane Sané
Mandicou Ba
Doudou Fall
Yuzo Taenaka
Ibrahima Niang
Youki Kadobayashi
Published in:
IEEE Access (2024)
Keyphrases
</>
virtual machine
allocation policies
operating system
countermeasures
key exchange protocol
authentication mechanism
security measures
authentication protocol
block cipher
database
data center
data mining
data analysis
public key