{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:03:24Z","timestamp":1730235804756,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,6]]},"DOI":"10.1109\/iccr56254.2022.9996066","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T21:53:52Z","timestamp":1672782832000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Security Analysis for Virtual Machine Allocation in Cloud Computing"],"prefix":"10.1109","author":[{"given":"Tahir","family":"Alyas","sequence":"first","affiliation":[{"name":"Lahore Garrison University,Department of Computer Science,Lahore,Pakistan,54000"}]},{"given":"Karamath","family":"Ateeq","sequence":"additional","affiliation":[{"name":"School of Information Technology, Skyline University College, University City Sharjah,Sharjah,UAE,1797"}]},{"given":"Mohammed","family":"Alqahtani","sequence":"additional","affiliation":[{"name":"College of Computer Science, and Information Technology, Abdulrahman Bin Faisal University,Department of Computer Information Systems,Dammam,Saudi Arabia,31441"}]},{"given":"Saigeeta","family":"Kukunuru","sequence":"additional","affiliation":[{"name":"Faculty Swiss Business school. RAK.,Assistant professor in management,UAE"}]},{"given":"Nadia","family":"Tabassum","sequence":"additional","affiliation":[{"name":"Virtual University of Pakistan,Department of Computer Science,Pakistan,54000"}]},{"given":"Rukshanda","family":"Kamran","sequence":"additional","affiliation":[{"name":"Faculty of Compter science and Information Technology Universiti,Kota Samarahan,Sarawak,East Malaysia,94300"}]}],"member":"263","reference":[{"issue":"5","key":"ref1","article-title":"Virtualization security in Data Centres & cloud","volume":"5","author":"Dhawale","year":"2014","journal-title":"International Journal of Scientific & Engineering Research"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/amm.543-547.3126"},{"key":"ref3","article-title":"Research on Virtualization Security in Cloud Computing","volume-title":"IOP Conference Series: Materials Science and Engineering","volume":"806","author":"Chen"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/fgct.2016.7605062"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.04.012"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/icces.2016.7821971"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/mines.2011.54"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20943-2"},{"key":"ref9","first-page":"51","author":"Kazim","year":"2015","journal-title":"Virtualization Security in Cloud Computing"},{"issue":"1","key":"ref10","first-page":"5","article-title":"Virtualization security in Data Centres & cloud","volume":"5","author":"Dhawale","year":"2014","journal-title":"International Journal of Scientific & Engineering Research"},{"key":"ref11","first-page":"229","article-title":"Security aspects of virtualization in cloud computing","volume":"8104","author":"Kazim","year":"2013","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/secon.2018.8479121"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.04.012"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4_23"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/itime.2011.6132034"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1741906.1741957"},{"volume-title":"Virtualization Security in Data Centers and Clouds","author":"Zheng","key":"ref17"},{"key":"ref18","first-page":"39","article-title":"Research on scheduling algorithm based on cloud computing","volume":"39","author":"Xian","year":"2011","journal-title":"Computer and Digital Engineering"},{"key":"ref19","first-page":"43","article-title":"Cloud computing resource schedule strategy based on mpso algorithm","volume":"37","author":"Liu","year":"2011","journal-title":"Computer Engineering"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.31979\/etd.et9e-73fz"},{"key":"ref21","first-page":"127","article-title":"Ant colony optimization algorithm for computing resource allocation based on cloud computing environment","volume":"1","author":"Hua","year":"2010","journal-title":"Journal of East China Normal University (Natural Science)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.06.008"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.7.1.42-52"}],"event":{"name":"2022 International Conference on Cyber Resilience (ICCR)","start":{"date-parts":[[2022,10,6]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2022,10,7]]}},"container-title":["2022 International Conference on Cyber Resilience (ICCR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9995718\/9995732\/09996066.pdf?arnumber=9996066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T11:26:12Z","timestamp":1709378772000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9996066\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iccr56254.2022.9996066","relation":{},"subject":[],"published":{"date-parts":[[2022,10,6]]}}}