{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:57:34Z","timestamp":1760245054783,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T00:00:00Z","timestamp":1556150400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"no funding"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11036-019-01261-3","type":"journal-article","created":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T09:05:31Z","timestamp":1556183131000},"page":"1240-1248","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Securing and Self recovery of Virtual Machines in cloud with an Autonomic Approach using Snapshots"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1673-6410","authenticated-orcid":false,"given":"Linda","family":"Joseph","sequence":"first","affiliation":[]},{"given":"Rajeswari","family":"Mukesh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,25]]},"reference":[{"key":"1261_CR1","doi-asserted-by":"publisher","unstructured":"van Cleeff A, Pieters W, Wieringa RJ (2009) Security Implications of Virtualization: A Literature Study. International Conference on Computational Science and Engineering, \n                              https:\/\/doi.org\/10.1109\/CSE.2009.267","DOI":"10.1109\/CSE.2009.267"},{"key":"1261_CR2","unstructured":"(2005) An architectural blueprint for autonomic computing, IBM"},{"key":"1261_CR3","doi-asserted-by":"publisher","unstructured":"Chen Z, Dongarra J (2009) Highly Scalable Self-Healing Algorithms for High Performance Scientific Computing. IEEE Trans Comput 58(11). \n                              https:\/\/doi.org\/10.1109\/TC.2009.42","DOI":"10.1109\/TC.2009.42"},{"key":"1261_CR4","unstructured":"Cloud Security Alliance (2010) Top Threats to Cloud Computing V1.0"},{"issue":"1","key":"1261_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2010","unstructured":"Subashini S, Kavitha V (2010) A Survey on Security Issues in Service Delivery Models of Cloud Computing. J Netw Comput Appl 34(1):1\u201311. \n                              https:\/\/doi.org\/10.1016\/j.jnca.2010.07.006","journal-title":"J Netw Comput Appl"},{"key":"1261_CR6","doi-asserted-by":"publisher","unstructured":"Nadeem MA (2016) Cloud Computing Security Issues and Challenges. Journal of Wireless Communications:10\u201315. \n                              https:\/\/doi.org\/10.21174\/jowc.v1i1.73","DOI":"10.21174\/jowc.v1i1.73"},{"issue":"2","key":"1261_CR7","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2010.115","volume":"9","author":"B Grobauer","year":"2011","unstructured":"Grobauer B, Walloschek T, Stocker E (2011) Understanding Cloud-Computing Vulnerabilities. IEEE Secur Priv 9(2):50\u201357. \n                              https:\/\/doi.org\/10.1109\/MSP.2010.115","journal-title":"IEEE Secur Priv"},{"key":"1261_CR8","doi-asserted-by":"publisher","unstructured":"Ibrahim A, Hamlyn-Harris J, Grundy J, Almorsy M (2011) Cloudsec: A security monitoring appliance for virtual machines in the IaaS cloud model. 2011 5th International Conference on Network and System Security (NSS), IEEE, pp. 113\u2013120, \n                              https:\/\/doi.org\/10.1109\/ICNSS.2011.6059967","DOI":"10.1109\/ICNSS.2011.6059967"},{"key":"1261_CR9","doi-asserted-by":"publisher","unstructured":"Li C, Raghunathan A, Jha NK (2012, IEEE) A Trusted Virtual Machine in an Untrusted Management Environment. IEEE Trans Serv Comput 5(4). \n                              https:\/\/doi.org\/10.1109\/TSC.2011.30","DOI":"10.1109\/TSC.2011.30"},{"key":"1261_CR10","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/s11227-012-0831-5","volume":"63","author":"C Modi","year":"2013","unstructured":"Modi C, Patel D, Borisaniya B, Patel A, Muttukrishnan Rajarajan J (2013) A survey on security issues and solutions at different layers of Cloud computing. J Supercomput 63:561\u2013592. \n                              https:\/\/doi.org\/10.1007\/s11227-012-0831-5","journal-title":"J Supercomput"},{"key":"1261_CR11","unstructured":"Sun C, Wang X (2013) The Notorious Nine: Cloud Computing Top Threats in 2013. Cloud Security Alliance"},{"issue":"1","key":"1261_CR12","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MCC.2014.20","volume":"1","author":"Z Tari","year":"2014","unstructured":"Tari Z (2014) Security and Privacy in Cloud Computing. IEEE Cloud Computing 1(1):54\u201357. \n                              https:\/\/doi.org\/10.1109\/MCC.2014.20","journal-title":"IEEE Cloud Computing"},{"key":"1261_CR13","doi-asserted-by":"publisher","unstructured":"Zhang F, Wang J, Sun K, Stavrou A (2014) HyperCheck: A Hardware-Assisted Integrity Monitor. IEEE Transactions on Dependable and Secure Computing 11(4). \n                              https:\/\/doi.org\/10.1109\/TDSC.2013.53","DOI":"10.1109\/TDSC.2013.53"},{"key":"1261_CR14","doi-asserted-by":"publisher","unstructured":"Selvam L, Kumar PM, Renjith JA (2014) Encryption-based secure sharing of data with fine-grained access control in public clouds. Journal of Applied Security Research. \n                              https:\/\/doi.org\/10.1080\/19361610.2014.883295","DOI":"10.1080\/19361610.2014.883295"},{"key":"1261_CR15","doi-asserted-by":"publisher","first-page":"260","DOI":"10.4236\/ijcns.2015.87026","volume":"8","author":"GC Obasuyi","year":"2015","unstructured":"Obasuyi GC, Sari A (2015) Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment. Int J Commun Netw Syst Sci 8:260\u2013273. \n                              https:\/\/doi.org\/10.4236\/ijcns.2015.87026","journal-title":"Int J Commun Netw Syst Sci"},{"key":"1261_CR16","doi-asserted-by":"publisher","unstructured":"Prakash A, Venkataramani E, Yin H, Lin Z (2015) On the Trustworthiness of Memory Analysis: An Empirical Study from the Perspective of Binary Execution. IEEE Transactions on Dependable and Secure Computing 12(5). \n                              https:\/\/doi.org\/10.1109\/TDSC.2014.2366464","DOI":"10.1109\/TDSC.2014.2366464"},{"key":"1261_CR17","doi-asserted-by":"publisher","unstructured":"Jin S, Ahn J, Seol J, Cha S, Huh J, Maeng S (2015) H-SVM: Hardware-Assisted Secure Virtual Machines under a Vulnerable Hypervisor. IEEE Trans Comput 64(10). \n                              https:\/\/doi.org\/10.1109\/TC.2015.2389792","DOI":"10.1109\/TC.2015.2389792"},{"key":"1261_CR18","doi-asserted-by":"publisher","unstructured":"Watson MR, Shirazi N-u-h, Marnerides AK, Mauthe A, Hutchison D (2015) Malware Detection in Cloud Computing Infrastructures. IEEE Transactions on Dependable and Secure Computing. \n                              https:\/\/doi.org\/10.1109\/TDSC.2015.2457918","DOI":"10.1109\/TDSC.2015.2457918"},{"key":"1261_CR19","doi-asserted-by":"publisher","unstructured":"Khatib EJ, Barco R, G\u00f3mez-Andrades A, Serrano I (2016) Diagnosis Based on Genetic Fuzzy Algorithms for LTE Self-Healing. IEEE Trans Veh Technol 65(3). \n                              https:\/\/doi.org\/10.1109\/TVT.2015.2414296","DOI":"10.1109\/TVT.2015.2414296"},{"key":"1261_CR20","doi-asserted-by":"publisher","unstructured":"Nenvani G, Gupta H (2016) A Survey on Attack Detection on Cloud using Supervised Learning Techniques, Symposium on Colossal Data Analysis and Networking (CDAN), \n                              https:\/\/doi.org\/10.1109\/CDAN.2016.7570872","DOI":"10.1109\/CDAN.2016.7570872"},{"key":"1261_CR21","doi-asserted-by":"publisher","unstructured":"Almulla S, Iraqi Y, Jones A (2016) Digital Forensic of a Cloud Based Snapshot\u201d The Sixth International Conference on Innovative Computing Technology, INTECH, \n                              https:\/\/doi.org\/10.1109\/INTECH.2016.7845140","DOI":"10.1109\/INTECH.2016.7845140"},{"key":"1261_CR22","doi-asserted-by":"publisher","unstructured":"Zhang T, Lee RB, Princeton University (2016) Monitoring and Attestation of virtual machine security health in cloud computing. IEEE Computer Society. \n                              https:\/\/doi.org\/10.1109\/MM.2016.86","DOI":"10.1109\/MM.2016.86"},{"key":"1261_CR23","doi-asserted-by":"publisher","unstructured":"Nikravesh AY, Samuel A Ajila and Chung-Horng Lung(2017) An autonomic prediction suite for cloud resource provisioning. Journal of Cloud Computing: Advances, Systems and Applications. \n                              https:\/\/doi.org\/10.1186\/s13677-017-0073-4","DOI":"10.1186\/s13677-017-0073-4"},{"key":"1261_CR24","doi-asserted-by":"publisher","unstructured":"Yang Y, Mao B, Fellow HJ, Yang Y, Luo H, Wu S (2018) SnapMig: Accelerating VM Live Storage Migration by Leveraging the Existing VM Snapshots in the Cloud. IEEE, Transactions on Parallel and Distributed Systems. \n                              https:\/\/doi.org\/10.1109\/TPDS.2018.2790389","DOI":"10.1109\/TPDS.2018.2790389"},{"key":"1261_CR25","doi-asserted-by":"publisher","unstructured":"Gill SS, Buyya R (2018) SECURE: self-protection approach in cloud resource management. IEEE Cloud Computing Co published by the IEEE CS and IEEE ComSoc, \n                              https:\/\/doi.org\/10.1109\/MCC.2018.011791715","DOI":"10.1109\/MCC.2018.011791715"},{"key":"1261_CR26","doi-asserted-by":"publisher","unstructured":"Joseph L, Mukesh R (2018) Detection of Malware Attacks on Virtual Machines for a Self-Heal Approach in Cloud Computing using VM Snapshots. Journal of Communications Software and Systems. \n                              https:\/\/doi.org\/10.24138\/jcomss.v14i3.537","DOI":"10.24138\/jcomss.v14i3.537"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01261-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-019-01261-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01261-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,23]],"date-time":"2020-04-23T23:08:35Z","timestamp":1587683315000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-019-01261-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,25]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["1261"],"URL":"https:\/\/doi.org\/10.1007\/s11036-019-01261-3","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2019,4,25]]},"assertion":[{"value":"25 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}