1.
Gan, C., Feng, Q., Zhang, X., Zhang, Z., and Zhu, Q., 2020. Dynamical propagation model of malware for cloud computing security. IEEE Access, 8, pp.20325-20333.
2.
Meng, T., Wolter, K., Wu, H. and Wang, Q., 2018. A secure and cost-efficient offloading policy for mobile cloud computing against timing attacks. Pervasive and Mobile Computing, 45, pp.4-18.
3.
Desai, M.R. and Patel, H.B., 2015, Efficient virtual machine migration in cloud computing. In 2015 Fifth international conference on communication systems and network technologies, pp. 1015-1019.
4.
Hanini, M., Kafhali, S.E. and Salah, K., 2019. Dynamic VM allocation and traffic control to manage QoS and energy consumption in a cloud computing environment. International Journal of Computer Applications in Technology, 60(4), pp.307-316.
5.
Perez-Botero, D., Szefer, J. and Lee, R.B., 2013, Characterizing hypervisor vulnerabilities in cloud computing servers. In Proceedings of the 2013 international workshop on Security in cloud computing (pp. 3-10).
6.
Nezarat, A. and Shams, Y., 2017. A game theoretic-based distributed detection method for VM-to-hypervisor attacks in a cloud environment. The Journal of Supercomputing, 73(10), pp.4407-4427.
7.
Cao, T., Mao, J., Bhattacharya, T., Peng, X., Ku, W.S. and Qin, X., 2021, DDoS Detection Systems for Cloud Data Storage. In 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), pp. 183-190.
8.
Velliangiri, S. and Pandey, H.M., 2020. Fuzzy-Taylor-elephant herd optimization inspired Deep Belief Network for DDoS attack detection and comparison with state-of-the-art algorithms. Future Generation Computer Systems, 110, pp.80-90.
9.
Varadharajan, V. and Tupakula, U., 2014. Security as a service model for cloud environment. IEEE Transactions on Network and Service Management, 11(1), pp.60-75.
10.
Nikolai, J. and Wang, Y., 2014, Hypervisor-based cloud intrusion detection system. In 2014 International Conference on Computing, Networking and Communications (ICNC), pp. 989-993.
11.
Dildar, M. S., Khan, N., Abdullah, J. B., & Khan, A. S. (2017). An effective way to defend the hypervisor attacks in cloud computing. In 2017 2ndInternational Conference on Anti-Cyber Crimes (ICACC), pp. 154-159.
12.
Feng, M., Wang, X., Zhang, Y. and Li, J., 2012, Multi-objective particle swarm optimization for resource allocation in cloud computing. In 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, vol. 3, pp. 1161-1165.
13.
Teng, L., Li, H., Yin, S., & Sun, Y. (2020). A Modified Advanced Encryption Standard for Data Security. Int. J. Netw. Secure., 22(1), 112-117.
14.
Anumukonda, N.S.K., Yadav, R.K. and NS, R., 2021, A Painstaking Analysis of Attacks on Hypervisors in Cloud Environment. In 2021 6th International Conference on Machine Learning Technologies, pp. 150-157.
15.
Annadanam, C.S., Chapram, S. and Ramesh, T., 2020. Intermediate node selection for Scatter-Gather VM migration in the cloud data center. Engineering Science and Technology, an International Journal, 23(5), pp.989-997.
16.
Bansal, M. and Malik, S.K., 2020. A multi-faceted optimization scheduling framework based on the particle swarm optimization algorithm in cloud computing. Sustainable Computing: Informatics and Systems, 28, pp.1-8.
17.
Saeedi, S., Khorsand, R., Bidgoli, S.G. and Ramezanpour, M., 2020. Improved many-objective particle swarm optimization algorithm for scientific workflow scheduling in cloud computing. Computers & Industrial Engineering, 147, pp.1-23.
18.
Pendli, V., Pathuri, M., Yandrathi, S. and Razaque, A., 2016, Improvising performance of advanced encryption standard algorithm. In 2016 second international conference on mobile and secure services (MobiSecServ), pp. 1-5.
19.
Kaushik, S. and Gandhi, C., 2020. Capability-based outsourced data access control with assured file deletion and efficient revocation with trust factor in cloud computing. International Journal of Cloud Applications and Computing (IJCAC), 10(1), pp.64-84.
20.
Xiaoyu Li, Shaohua Tang, Lingling Xu, Huaqun Wang, and Jie Chen, “Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems”, IEEE Access, Volume 5, 2017.