{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:52:05Z","timestamp":1725731525868},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icccn.2015.7288394","type":"proceedings-article","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T22:06:14Z","timestamp":1444082774000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Detection of Service Level Agreement (SLA) Violation in Memory Management in Virtual Machines"],"prefix":"10.1109","author":[{"given":"Xiongwei","family":"Xie","sequence":"first","affiliation":[]},{"given":"Weichao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Tuanfa","family":"Qin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","article-title":"Configure the virtual machine communication interface in the vsphere web client","author":"ware","year":"2012","journal-title":"vSphere Virtual Machine Administration Guide for ESXi 5 X"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-36584-8_10"},{"key":"ref32","first-page":"54","article-title":"Security service level agreements: Quantifiable security for the enterprise?","author":"henning","year":"1999","journal-title":"Proceedings of the workshop on New security paradigms"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1104"},{"key":"ref30","article-title":"Credo: Trusted computing for guest vms with a commodity hypervi-sor","author":"raj","year":"2011","journal-title":"Microsoft Research MSR- TR-2011&#x2013;130 Redmond WA USA"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40651-5_14"},{"year":"2011","key":"ref36","article-title":"Timekeeping in vmware virtual machines"},{"year":"2007","key":"ref35","article-title":"An analysis of address space layout randomization on windows vista"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICNS.2010.36"},{"journal-title":"VMWare &#x201C;esxi configuration guide &#x201D; VMware vSphere 4 1 Documen-tation","year":"2010","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1831407.1831429"},{"key":"ref12","first-page":"19","article-title":"increasing memory density by using ksm","author":"arcangeli","year":"2009","journal-title":"Linux Symposium"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2011.6108094"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1972551.1972552"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575349"},{"key":"ref16","first-page":"128","article-title":"Stealthy malware detection through vmm-based &#x201C;out-of-the-box&#x201D; semantic view reconstruction","author":"jiang","year":"2007","journal-title":"Proceedings of the ACM Conference on Computer and Communications Security"},{"key":"ref17","article-title":"Mycloud - supporting user-configured privacy protection in cloud computing","author":"li","year":"0","journal-title":"Annual Computer Security Applications Conference 2013"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2014.7027336"},{"first-page":"411","article-title":"Understanding memory resource management in vmware esx 4.1","year":"2010","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.29"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/HPCS.2010.5547150"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2011.5958812"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.68"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.08.018"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523663"},{"key":"ref5","first-page":"783","article-title":"Estab-lishing and monitoring slas in complex service based systems","author":"comuzzi","year":"2009","journal-title":"IEEE International Conference on Web Services (ICWS)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1773912.1773926"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15681-6_12"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2010.70"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.34"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1108\/10878571211242920"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046670"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9049-y"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127494"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2011.51"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2155620.2155652"}],"event":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","start":{"date-parts":[[2015,8,3]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2015,8,6]]}},"container-title":["2015 24th International Conference on Computer Communication and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7287473\/7288342\/07288394.pdf?arnumber=7288394","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T03:37:12Z","timestamp":1490413032000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7288394\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/icccn.2015.7288394","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}