[1]
|
IMPLEMENTASI HIGH AVAILABILITY SERVER MENGGUNAKAN METODE LOAD BALANCING DAN FAILOVER PADA VIRTUAL WEB SERVER CLUSTER
|
|
NULL |
|
|
[2]
|
A Review on Virtual Machine Placement with ACO in Cloud Computing
|
|
International Conference on Innovative …,
2023 |
|
|
[3]
|
Recent advancement in VM task allocation system for cloud computing: review from 2015 to2021
|
|
Artificial Intelligence Review,
2022 |
|
|
[4]
|
A novel technique for accelerating live migration in cloud computing
|
|
Automated Software Engineering,
2022 |
|
|
[5]
|
Implementasi High Availability Server Menggunakan Platform Haproxy (studi Kasus: Aplikasi Zammad Untuk Online Help Desk)
|
|
eProceedings …,
2021 |
|
|
[6]
|
Performance of Virtual Machine Managers for Computer Network Learning
|
|
2021 5th International …,
2021 |
|
|
[7]
|
A Review on Cloud Computing services, concerns, and security risk awareness in the context of Digital Transformation
|
|
2021 6th South-East …,
2021 |
|
|
[8]
|
Application of standards for vulnerability prevention in virtualization systems
|
|
2021 |
|
|
[9]
|
An analysis of Approaches for Desktop Virtualization and Challenges
|
|
2021 |
|
|
[10]
|
Critical Success Factors for Cloud-Based eLearning Adoption
|
|
Selangor Science & …,
2021 |
|
|
[11]
|
A modelling & Simulation via CloudSim for Live Migration in Virtual Machines
|
|
2021 |
|
|
[12]
|
An Efficient Resource Utilization in VM Live Migration Techniques using CloudSim a Simulation tool
|
|
2021 |
|
|
[13]
|
A Study of Virtual Machineries Technology in Cloud Computing
|
|
2020 |
|
|
[14]
|
ОБРАБОТКА ЖУРНАЛОВ ВЕБ СЕРВЕРОВ ДЛЯ ПОЛУЧЕНИЯ СТАТИСТИКИ САЙТОВ С ПОМОЩЬЮ ИНСТРУМЕНТА APACHE SPARK
|
|
2020 |
|
|
[15]
|
Virtualization and Cloud Computing-Concepts
|
|
2020 |
|
|
[16]
|
Security Aspects of Virtualization and Its Impact on Business Information Security
|
|
2020 |
|
|
[17]
|
Effectiveness of technology adoption for strategy implementation
|
|
2019 |
|
|
[18]
|
Role of Virtualization Techniques in Cloud Computing Environment
|
|
Advances in Computer Communication and Computational Sciences,
2019 |
|
|
[19]
|
Securing and Self recovery of Virtual Machines in cloud with an Autonomic Approach using Snapshots
|
|
2019 |
|
|
[20]
|
PRODUCTIVITY & QUALITY IMPROVEMENTUSING COMPUTER INTEGRATED MANUFACTURING IN DIE MANUFACTURING INDUSTRY
|
|
GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES,
2019 |
|
|
[21]
|
CENTRO DE CIÊNCIAS EXATAS E TECNOLOGIA PROGRAMA DE PÓS-GRADUAÇÃO EM INFORMÁTICA
|
|
2019 |
|
|
[22]
|
Desktop Virtualization on different system using Hyper-V
|
|
International Journal of Management, Technology And Engineering,
2019 |
|
|
[23]
|
Análise de Desempenho da Migração de Instâncias em Openstack
|
|
2019 |
|
|
[24]
|
Issues and Challenges in Management related to Information Technology
|
|
2019 |
|
|
[25]
|
Reviewing Threats Prevalent To Hypervisor
|
|
Think India Journal,
2019 |
|
|
[26]
|
MEMBANGUN BACKUP DATA CENTER MENGGUNAKAN ZERTO VIRTUAL REPLICATION
|
|
2019 |
|
|
[27]
|
Implementation levels of virtualization and security issues in cloud computing
|
|
2018 |
|
|
[28]
|
lLTZVisor: a lightweight TrustZone-assisted hypervisor for low-end ARM devices
|
|
2018 |
|
|
[29]
|
Use of Blockchain in Strenghening Cybersecurity And Protecting Privacy
|
|
International Journal of Engineering and Information Systems,
2018 |
|
|
[30]
|
Vulnerability Assessment and Penetration Testing of Virtualization
|
|
OIC-CERT Journal of Cyber Security,
2018 |
|
|
[31]
|
Innovation of Secure Payment Gateway Principles from Cash to Bitcoin
|
|
2018 |
|
|
[32]
|
Retrospektive Analyse der Ausbreitung und dynamische Erkennung von Web-Tracking durch Sandboxing
|
|
2018 |
|
|
[33]
|
Secure Fuzzy Logic to Study the Impact of Knowledge Management Enablers on Organizational Performance through Decision Making Mediator
|
|
2018 |
|
|
[34]
|
Enhancing the Hypervisor as a Second Layer of Authentication
|
|
Int. Journal of Engineering Research and Application,
2018 |
|
|
[35]
|
An Investigation of Increasing the Performance of Electric Rickshaw-Pedicab Batteries
|
|
2018 |
|
|
[36]
|
Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy
|
|
2018 |
|
|
[37]
|
SECURITY AWARENESS IN VIRTUALIZED SERVER BASED COMPUTING: THREAT SOURCES AND ATTACK TYPES IN HYPERVISORS
|
|
2018 |
|
|
[38]
|
Comparative Analysis Of Proxmox VE And Xenserver As Type 1 Open Source Based Hypervisors
|
|
2018 |
|
|
[39]
|
Computer Centres Resource Cloud Elasticity-Scalability (CRECES): Copperbelt University Case Study
|
|
Critical Research on Scalability and Security Issues in Virtual Cloud Environments,
2018 |
|
|
[40]
|
Awareness of Intrusion Detection and Prevention for Virtualized Server Environment in Institutions in Tanzania
|
|
2018 |
|
|
[41]
|
C-DIDS: A Cooperative and Distributed Intrusion Detection System in Cloud environment
|
|
2018 |
|
|
[42]
|
A Study on Resource Pooling, Allocation and Virtualization Tools used for Cloud Computing
|
|
International Journal of Computer Applications,
2017 |
|
|
[43]
|
A Novel Approach for Dynamic Apportion and De-Allocate Resources from the Cloud
|
|
International Journal of Emerging Research inManagement & Technology,
2017 |
|
|
[44]
|
To Implement Server Virtualization and Consolidation Using 2P-Cloud Architecture
|
|
2017 |
|
|
[45]
|
Hypervisor based performance characterization: XEN/KVM
|
|
2017 2nd International Conference on Telecommunication and Networks (TEL-NET),
2017 |
|
|
[46]
|
Secure Live Migration in Cloud Computing
|
|
2017 |
|
|
[47]
|
Virtual machine security
|
|
International Journal of Information and Computer Security,
2017 |
|
|
[48]
|
Network hypervisors pros and cons: a survey
|
|
2017 |
|
|
[49]
|
VIRTUAL MACHINE PLACEMENT AND LOAD REBALANCING ALGORITHMS IN CLOUD COMPUTING SYSTEMS
|
|
INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY,
2016 |
|
|
[50]
|
Security Challenges of Virtualization in Cloud Computing
|
|
ICTCS 2016 Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies,
2016 |
|
|
[51]
|
Extension of Kerberos with X. 509 and Integration of Elliptic Curve Cryptography in Authentication
|
|
2016 |
|
|
[52]
|
Optimized Algorithms for Virtual Machine Placement based on Multi-Dimensional Resource Characteristics in Cloud Computing Systems
|
|
International Journal of Computational Intelligence and Informatics,
2016 |
|
|
[53]
|
Virtual Machine Placement using Enhanced Scheduling and Load Rebalancing using Hybrid Algorithms Based on Multi-Dimensional Resource Characteristics in Cloud Computing Systems
|
|
International Journal for Scientific Research & Development,
2016 |
|
|
[54]
|
Energy efficient network function virtualization in 5G networks
|
|
2015 |
|
|
[55]
|
Security and Optimization Challenges of Green Data Centers
|
|
International Journal of Communications, Network and System Sciences,
2015 |
|
|
[56]
|
Fault Tolerance Mechanisms in Distributed Systems
|
|
International Journal of Communications, Network and System Sciences,
2015 |
|
|
[57]
|
Comparative Analysis of Wireless Security Protocols: WEP vs WPA
|
|
International Journal of Communications, Network and System Sciences,
2015 |
|
|
[58]
|
Review of the Security Issues in Vehicular Ad Hoc Networks (VANET)
|
|
2015 |
|
|
[59]
|
Dissemination of Information Communication Technologies: Mobile Government Practices in Developing States
|
|
International Journal of Communications, Network and System Sciences,
2015 |
|
|
[60]
|
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
|
|
International Journal of Communications, Network and System Sciences,
2015 |
|
|
[61]
|
Collision Avoidance in Mobile Wireless Ad-Hoc Networks with Enhanced MACAW Protocol Suite
|
|
International Journal of Communications, Network and System Sciences,
2015 |
|
|
[62]
|
Virtual Machine Placement using Enhanced Scheduling and Load Rebalancing using Hybrid Algorithms Based on Multi-Dimensional Resource …
|
|
|
|
|