{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:38:58Z","timestamp":1730227138151,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,14]]},"DOI":"10.1109\/ic3i56241.2022.10072960","type":"proceedings-article","created":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T17:34:44Z","timestamp":1679506484000},"page":"444-449","source":"Crossref","is-referenced-by-count":0,"title":["Virtual Machine Migration Techniques, Security Threats and Vulnerabilities"],"prefix":"10.1109","author":[{"given":"N.B.","family":"Kadu","sequence":"first","affiliation":[{"name":"Dr. A. P. J. Abdul Kalam University,Indore"}]},{"given":"Pramod","family":"Jadhav","sequence":"additional","affiliation":[{"name":"Dr. A. P. J. Abdul Kalam University,Indore"}]},{"given":"Santosh","family":"Pawar","sequence":"additional","affiliation":[{"name":"Dr. A. P. J. Abdul Kalam University,Indore"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSSA.2012.6366028"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2009.144"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2009.103"},{"key":"ref4","article-title":"Vm\u2019s create potential risks","volume-title":"Technical report, dark READING","author":"Higgins","year":"2007"},{"key":"ref5","article-title":"Secuirty tip: 3 steps towards securing virtual machines","author":"Huston","year":"2007","journal-title":"Security"},{"journal-title":"IBM","article-title":"Discover the Linux Kernel Virtual Machine","author":"Jones","key":"ref6"},{"key":"ref7","article-title":"Virtual machine security guidelines","author":"Kirch","year":"2007","journal-title":"The center for Internet Security"},{"key":"ref8","article-title":"The pros and cons of virtualization","author":"Mann","year":"2007","journal-title":"BTQ"},{"key":"ref9","article-title":"Whitepaper: Virtual machine security guidelines","author":"Marshall","year":"2007","journal-title":"InfoWorld"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.283"},{"key":"ref11","first-page":"303","article-title":"Live migration of virtual machine based on recovering system and CPU scheduling","volume-title":"6th IEEE joint International Information Technology and Artificial Intelligence Conference","author":"Weining"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2813541"},{"key":"ref13","article-title":"Energy-Efficient Resource Allocation in Cloud Computing Environments","volume":"4","author":"Shahinvakilinia","year":"2016","journal-title":"IEEE Access, special section on future networks: architectures, protocols, and applications"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-013-0275-4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-015-0460-x"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCity.2015.210"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.72"},{"issue":"2","key":"ref18","first-page":"420","article-title":"Maintainability prediction of object oriented software system by using artificial neural network approach","volume":"2","author":"Dash","year":"2012","journal-title":"International Journal of Soft Computing and Engineering (IJSCE)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/confluence47617.2020.9058211"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-6620-7_56"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2015.12.001"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ictai53825.2021.9673458"},{"issue":"3","key":"ref23","first-page":"11485","article-title":"Technology Acceptance Model to Assess Employees Perception and Intention of Integration of Artificial Intelligence and Human Resource Management in IT Industry","volume":"29","author":"Singh","year":"2020","journal-title":"Technology"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/iciem54221.2022.9853047"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ictai53825.2021.9673154"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/iciem48762.2020.9160337"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/iciem51511.2021.9445307"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-8012-0_15"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3647-2_1"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.35940\/ijrte.C5942.098319"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/iciem54221.2022.9853147"},{"key":"ref31a","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77070-9"}],"event":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","start":{"date-parts":[[2022,12,14]]},"location":"Uttar Pradesh, India","end":{"date-parts":[[2022,12,16]]}},"container-title":["2022 5th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10072015\/10072297\/10072960.pdf?arnumber=10072960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T13:38:12Z","timestamp":1707831492000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10072960\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,14]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/ic3i56241.2022.10072960","relation":{},"subject":[],"published":{"date-parts":[[2022,12,14]]}}}