Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Hong-Chao Hu"'
Publikováno v:
网络与信息安全学报, Vol 3, Iss 10, Pp 35-43 (2017)
The resource-sharing model for cloud computing raises many security issues,such as co-resident of virtual machines,while greatly improving resource utilization.In particular,when a user adopts a single operating system,an attacker can steal privacy a
Externí odkaz:
https://doaj.org/article/5bec801ce3e64e689469f87e38071b1e
Publikováno v:
网络与信息安全学报, Vol 3, Iss 10, Pp 52-61 (2017)
To deal with the attacks employing unknown security vulnerabilities or backdoors which are difficult for traditional defense techniques to eliminate,mimic security defense (MSD) that employs “dynamic,heterogeneity,redundancy (DHR)” mechanism can
Externí odkaz:
https://doaj.org/article/3090821dab9043379fb839ac04e178ac
Microwave-assisted aqueous two-phase extraction (MAATPE) was applied to obtain anthocyanins from mulberry using ethanol/ammonium sulfate ((NH4)2SO4) as the biphasic extractant. The optimal conditions for anthocyanins extraction were determined by res
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ace4830ecf2196588680de4454e73d08
https://doi.org/10.21203/rs.3.rs-2649504/v1
https://doi.org/10.21203/rs.3.rs-2649504/v1
Publikováno v:
IEICE Transactions on Information and Systems. :1993-2003
Publikováno v:
Frontiers of Information Technology & Electronic Engineering. 20:731-748
Co-residency of different tenants’ virtual machines (VMs) in cloud provides a good chance for side-channel attacks, which results in information leakage. However, most of current defense suffers from the generality or compatibility problem, thus fa
Publikováno v:
Frontiers of Information Technology & Electronic Engineering. 20:238-252
Although the perimeter security model works well enough when all internal hosts are credible, it is becoming increasingly difficult to enforce as companies adopt mobile and cloud technologies, i.e., the rise of bring your own device (BYOD). It is obs
Publikováno v:
Frontiers of Information Technology & Electronic Engineering. 19:1522-1536
With more large-scale scientific computing tasks being delivered to cloud computing platforms, cloud workflow systems are designed for managing and arranging these complicated tasks. However, multi-tenant coexistence service mode of cloud computing b
Autor:
Xin-Zhong, Wang, Guo-Shun, Liu, Hong-Chao, Hu, Zhen-Hai, Wang, Qing-Hua, Liu, Xu-Feng, Liu, Wei-Hong, Hao, Yan-Tao, Li
Publikováno v:
In Computers and Electronics in Agriculture 2009 65(2):168-175
Publikováno v:
Frontiers of Information Technology & Electronic Engineering. 18:1854-1866
Network function virtualization (NFV) is a newly proposed technique designed to construct and manage network functions dynamically and efficiently. Allocating physical resources to the virtual network function forwarding graph is a critical issue in
Publikováno v:
Journal of Electronics & Information Technology. 35:2985-2991