References
- Tiwari, Pradeep Kumar, and Sandeep Joshi. A comprehensive report on security and privacy challenges in Software as a Service. In Multidisciplinary Approaches to Service-Oriented Engineering, pp. 143-167. IGI Global, (2018). doi: https://doi.org/10.4018/978-1-5225-5951-1.ch007
- Singh, Harvinder, Anshu Bhasin, and Parag Kaveri. “SECURE: Efficient resource scheduling by swarm in cloud computing.” Journal of Discrete Mathematical Sciences and Cryptography 22, no. 2 (2019): 127-137. doi: https://doi.org/10.1080/09720529.2019.1576334
- Arora, Amandeep Singh, Barkha Bahl, and Linesh Raja. “Diverse real-time attack traffic forecasting for cloud platforms.” Journal of Discrete Mathematical Sciences and Cryptography 22.4 (2019): 541-555. doi: https://doi.org/10.1080/09720529.2019.1638579
- Zhihua Li, Shujie Guo, Lei Yu, and Victor Chang. Evidence-efficient affinity propagation scheme for virtual machine placement in data center. IEEE Access, 8:158356–158368, (2020). doi: https://doi.org/10.1109/ACCESS.2020.3020043
- Shalu, and Dinesh Singh. “Artificial neural network-based virtual machine allocation in cloud computing.” Journal of Discrete Mathematical Sciences and Cryptography (2021): 1-12. doi: https://doi.org/10.1080/09720529.2021.1878626
- Mishra, Narendra, and R. K. Singh. “DDoS vulnerabilities analysis and mitigation model in cloud computing.” Journal of Discrete Mathematical Sciences and Cryptography 23.2 (2020): 535-545. doi: https://doi.org/10.1080/09720529.2020.1729503
- Seyedeh Yasaman Rashida, Masoud Sabaei, Mohammad Mehdi Ebadzadeh, and Amir Masoud Rahmani. A memetic grouping genetic algorithm for cost efficient vm placement in multi-cloud environment. Cluster Computing, pages 1–40, (2019).
- Mishra, Narendra, and R. K. Singh. “Prioritisation and security defense algorithm for cloud specific vulnerability through scoring and base metric group.” Journal of Interdisciplinary Mathematics 23.2 (2020): 481-491. doi: https://doi.org/10.1080/09720502.2020.1731961
- Shankar, Vishnu, and Karan Singh. “Applications of attribute-based encryption in cloud computing environment.” Big Data Analytics. Springer, Singapore, 2018. 687-692 doi: https://doi.org/10.1007/978-981-10-6620-7_66
- Mahfuzur Rahman and Peter Graham. Compatibility-based static vm placement minimizing interference. Journal of Network and Computer Applications, 84:68–81, (2017). doi: https://doi.org/10.1016/j.jnca.2017.02.004
- Zhijiao Xiao, Jianmin Jiang, Yingying Zhu, Zhong Ming, Shenghua Zhong, and Shubin Cai. A solution of dynamic vms placement problem for energy consumption optimization based on evolutionary game theory. Journal of Systems and Software, 101:260–272, (2015). doi: https://doi.org/10.1016/j.jss.2014.12.030
- Renuga Kanagavelu, Bu-Sung Lee, Nguyen The Dat Le, Luke Ng Mingjie, and Khin Mi Mi Aung. Virtual machine placement with two-path traffic routing for reduced congestion in data center networks. Computer Communications, 53:1–12, (2014). doi: https://doi.org/10.1016/j.comcom.2014.07.009
- Aisha Fatima, Nadeem Javaid, Tanzeela Sultana, Mohammed Y Aalsalem, Shaista Shabbir, et al. An efficient virtual machine placement via bin packing in cloud data centers. In International Conference on Advanced Information Networking and Applications, pages 977–987. Springer, (2019).