{"id":"https://openalex.org/W2051180285","doi":"https://doi.org/10.1109/icitst.2014.7038788","title":"Secure virtualised environment","display_name":"Secure virtualised environment","publication_year":2014,"publication_date":"2014-12-01","ids":{"openalex":"https://openalex.org/W2051180285","doi":"https://doi.org/10.1109/icitst.2014.7038788","mag":"2051180285"},"language":"en","primary_location":{"id":"doi:10.1109/icitst.2014.7038788","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2014.7038788","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110199847","display_name":"Pushpinder Kaur Chouhan","orcid":null},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Pushpinder Kaur Chouhan","raw_affiliation_strings":["Centre for Secure Information Technologies, Queens University of Belfast, Northern Ireland, UK"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, Queens University of Belfast, Northern Ireland, UK","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103745938","display_name":"Sakir Sezer","orcid":null},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sakir Sezer","raw_affiliation_strings":["Centre for Secure Information Technologies, Queens University of Belfast, Northern Ireland, UK"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, Queens University of Belfast, Northern Ireland, UK","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103554553","display_name":"Yangseo Choi","orcid":"https://orcid.org/0000-0002-6243-2111"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Yangseo Choi","raw_affiliation_strings":["Electronics and Telecommunications Research Institute, South Korea","Electronics and Telecommunications Research Institute,,South Korea"],"affiliations":[{"raw_affiliation_string":"Electronics and Telecommunications Research Institute, South Korea","institution_ids":["https://openalex.org/I142401562"]},{"raw_affiliation_string":"Electronics and Telecommunications Research Institute,,South Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084546292","display_name":"Ikkyun Kim","orcid":"https://orcid.org/0000-0001-8915-3270"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Ikkyun Kim","raw_affiliation_strings":["Electronics and Telecommunications Research Institute, South Korea","Electronics and Telecommunications Research Institute,,South Korea"],"affiliations":[{"raw_affiliation_string":"Electronics and Telecommunications Research Institute, South Korea","institution_ids":["https://openalex.org/I142401562"]},{"raw_affiliation_string":"Electronics and Telecommunications Research Institute,,South Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006458215","display_name":"Chunghwan Jung","orcid":"https://orcid.org/0000-0003-3799-6203"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chunghwan Jung","raw_affiliation_strings":["Ahnlab, Inc, South Korea","Ahnlab, Inc South Korea"],"affiliations":[{"raw_affiliation_string":"Ahnlab, Inc, South Korea","institution_ids":[]},{"raw_affiliation_string":"Ahnlab, Inc South Korea","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5110199847"],"corresponding_institution_ids":["https://openalex.org/I126231945"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13615137,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"36","issue":null,"first_page":"112","last_page":"117"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.8801853656768799},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8470699787139893},{"id":"https://openalex.org/keywords/hypervisor","display_name":"Hypervisor","score":0.8440021276473999},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.749142050743103},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7366217374801636},{"id":"https://openalex.org/keywords/hardware-virtualization","display_name":"Hardware virtualization","score":0.4946396052837372},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4784529209136963},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4636695384979248},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.42982804775238037},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40878742933273315},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3425745368003845}],"concepts":[{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.8801853656768799},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8470699787139893},{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.8440021276473999},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.749142050743103},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7366217374801636},{"id":"https://openalex.org/C68793194","wikidata":"https://www.wikidata.org/wiki/Q1616095","display_name":"Hardware virtualization","level":5,"score":0.4946396052837372},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4784529209136963},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4636695384979248},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.42982804775238037},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40878742933273315},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3425745368003845}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icitst.2014.7038788","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2014.7038788","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:publications/aaa0acfd-5cd7-4bb7-a745-3308ab65bd38","is_oa":false,"landing_page_url":"https://pure.qub.ac.uk/en/publications/aaa0acfd-5cd7-4bb7-a745-3308ab65bd38","pdf_url":null,"source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Chouhan , P K , Sezer , S , Choi , Y , Kim , I &amp; Jung , C 2014 , Secure Virtualised Environment . in 2014 9th International Conference for Internet Technology and Secured Transactions (ICITST) . Institute of Electrical and Electronics Engineers Inc. , pp. 112-117 , 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014) , London , United Kingdom , 08/12/2014 . https://doi.org/10.1109/ICITST.2014.7038788","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3737606294","display_name":null,"funder_award_id":"EP/K003445/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5334834590","display_name":null,"funder_award_id":"EP/H049606/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5445011987","display_name":null,"funder_award_id":"EP/K004379/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G745166385","display_name":null,"funder_award_id":"EP/G034303/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G7778643072","display_name":null,"funder_award_id":"EP/J006238/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W97539848","https://openalex.org/W161931246","https://openalex.org/W1641762327","https://openalex.org/W1907436083","https://openalex.org/W1922956467","https://openalex.org/W1967602317","https://openalex.org/W1970131138","https://openalex.org/W2007152733","https://openalex.org/W2043622642","https://openalex.org/W2082261923","https://openalex.org/W2140244636","https://openalex.org/W2142892618","https://openalex.org/W2166004296","https://openalex.org/W2408352574","https://openalex.org/W2535134046","https://openalex.org/W4241912528","https://openalex.org/W6603957951","https://openalex.org/W6606533738","https://openalex.org/W6637110787","https://openalex.org/W6639672756","https://openalex.org/W6640182669","https://openalex.org/W6713501767"],"related_works":["https://openalex.org/W2743348030","https://openalex.org/W2088620127","https://openalex.org/W2622620488","https://openalex.org/W3083135738","https://openalex.org/W2005435933","https://openalex.org/W2413559826","https://openalex.org/W252333682","https://openalex.org/W2747005099","https://openalex.org/W2145292010","https://openalex.org/W2086039693"],"abstract_inverted_index":{"Cloud":[0,14,65],"computing":[1,15,35,66,118],"is":[2,29,95],"a":[3],"technological":[4],"advancement":[5],"that":[6],"provide":[7,126],"resources":[8,36,56],"through":[9],"Internet":[10],"on":[11,41,130,185],"pay-as-you-go":[12],"basis.":[13],"uses":[16],"virtualisation":[17,91],"technology":[18],"to":[19,32,37,58,80,85,90,98,111,178],"enhance":[20],"the":[21,30,34,45,53,100],"efficiency":[22,182],"and":[23,63,75,145,167,183],"effectiveness":[24],"of":[25,48,55,73,153],"its":[26,180],"advantages.":[27],"Virtualisation":[28,121,168],"key":[31],"consolidate":[33],"run":[38],"multiple":[39],"instances":[40],"each":[42],"hardware,":[43],"increasing":[44],"utilization":[46,148],"rate":[47],"every":[49],"resource,":[50],"thus":[51],"reduces":[52],"number":[54],"needed":[57],"buy,":[59],"rack,":[60],"power,":[61],"cool,":[62],"manage.":[64],"has":[67,175],"very":[68],"appealing":[69],"features,":[70],"however,":[71],"lots":[72],"enterprises":[74],"users":[76],"are":[77],"still":[78],"reluctant":[79],"move":[81],"into":[82],"cloud":[83,117],"due":[84],"serious":[86],"security":[87,127],"concerns":[88],"related":[89],"layer.":[92],"Thus,":[93],"it":[94],"foremost":[96],"important":[97],"secure":[99,112],"virtual":[101],"environment.":[102,188],"In":[103],"this":[104],"paper,":[105],"we":[106],"present":[107],"an":[108],"elastic":[109],"framework":[110],"virtualised":[113,187],"environment":[114],"for":[115,132],"trusted":[116],"called":[119],"Server":[120],"Security":[122,169],"System":[123],"(SVSS).":[124],"SVSS":[125,151,173],"solutions":[128],"located":[129],"hypervisor":[131],"Virtual":[133],"Machines":[134],"by":[135],"deploying":[136],"malicious":[137],"activity":[138],"detection":[139],"techniques,":[140,144],"network":[141],"traffic":[142],"analysis":[143,149],"system":[146],"resource":[147],"techniques.":[150],"consists":[152],"four":[154],"modules:":[155],"Anti-Virus":[156],"Control":[157],"Module,":[158,162],"Traffic":[159],"Behavior":[160],"Monitoring":[161],"Malicious":[163],"Activity":[164],"Detection":[165],"Module":[166],"Management":[170],"Module.":[171],"A":[172],"prototype":[174],"been":[176],"deployed":[177],"validate":[179],"feasibility,":[181],"accuracy":[184],"Xen":[186]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
