2019 9th International Conference on Cloud Computing, Data Science &Amp; Engineering (Confluence) 2019
DOI: 10.1109/confluence.2019.8776920
|View full text |Cite
|
Sign up to set email alerts
|

VM Availability in Presence of Malicious Attacks in Open-Source Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…While there is a lack of application for EcBT and WMO in the last 5 years, they have been actively reviewed by work that either adopt them or strive to develop a new fault taxonomy for a different software disciplines. This is observed in EcBT [17]- [19], WMO [20], CFWA [21]- [23], OOWFT [24]- [25], WFT [25]- [26] and WAFC [27] respectively.…”
Section: Rq3: How Is the Fault Taxonomy Applied Reviewed Or Validated?mentioning
confidence: 83%
“…While there is a lack of application for EcBT and WMO in the last 5 years, they have been actively reviewed by work that either adopt them or strive to develop a new fault taxonomy for a different software disciplines. This is observed in EcBT [17]- [19], WMO [20], CFWA [21]- [23], OOWFT [24]- [25], WFT [25]- [26] and WAFC [27] respectively.…”
Section: Rq3: How Is the Fault Taxonomy Applied Reviewed Or Validated?mentioning
confidence: 83%
“…Dendroid [58] is a recent Remote Administration Toolkit (RAT), which lets adversaries create a malicious app that controls the mobile device through a command & control server [59]. Dendroid breached Bouncer, an app vetting and malware blocking dynamic analysis service provided by Google in their Play store.…”
Section: A Dendroidmentioning
confidence: 99%