[1] |
FOUKAS X , PATOUNA S G , ELMOKASHFIA ,et al. Network slicing in 5G:survey and challenges[J]. IEEE Communications Magazine, 2017,55(5): 94-100.
|
[2] |
ZHU Q , ZHU J D , AGRAWALG . Power-aware consolidation of scientific workflows in virtualized environments[C]// High Performance Computing,Networking,Storage & Analysis. 2010: 1-12.
|
[3] |
XU F , LIU F M , LIU L H ,et al. iAware:making live migration of virtual machines interference-aware in the cloud[J]. IEEE Transactions on Computers, 2014,63(12): 3012-3025.
|
[4] |
ALANR , AMANK , SRIRAMG , ,et al. PACMan:performance aware virtual machine consolidation[C]// The 10th International Conference on Autonomic Computing. 2013: 83-94.
|
[5] |
ROOZBEHM , ALBERTY Z , . Managing performance degradation of collocated virtual machines in private cloud[C]// The 18th International Conference on High Performance Computing and Communications. 2016: 128-135.
|
[6] |
GULMEZOGLUB , MEHMETS i , IRAZOQUIG ,et al. Cross-VM cache attacks on AES[J]. IEEE Transactions on Multi-Scale Computing Systems, 2017,2(3): 211-222.
|
[7] |
HAN Y , CHAN J , ALPCAN T ,et al. Using virtual machine allocation policies to defend against co-resident attacks in cloud computing[J]. IEEE Transactions on Dependable and Secure Computing, 2017,14(1): 95-108.
|
[8] |
AHMED H A , GEORGE A , MINA G ,et al. It's time to migrate! A game-theoretic framework for protecting a multi-tenant cloud against collocation attacks[C]// IEEE International Conference on Cloud Computing. 2018: 725-731.
|
[9] |
YU S , GUI X , LIN J ,et al. A security-awareness virtual machine management scheme based on Chinese wall policy in cloud computing[J]. The Scientific World Journal, 2014(5): 805-923.
|
[10] |
LIANG X , GUI X L , JIANA N ,et al. Mitigating cloud co-resident attacks via grouping-based virtual machine placement strategy[C]// IEEE International Performance Computing and Communications Conference. 2017: 1-8.
|
[11] |
SAMAM R , AN X L , WEI Q ,et al. Reshaping the mobile core network via function decomposition and network slicing for the 5G era[C]// IEEE Wireless Communications and Networking Conference Workshops. 2016: 90-96.
|
[12] |
SAMEERKUMARS , RAYMONDM , ANDREAF . A cloud-native approach to 5G network slicing[J]. IEEE Journals & Magazines, 2017,55(8): 120-127.
|
[13] |
TOMASL , LAKEWE B , ELMROTHE , . Service level and performance aware dynamic resource allocation in overbooked data centers[C]// IEEE/ACM International Symposium on Cluster. 2016.
|
[14] |
梁鑫, 桂小林, 戴慧珺 ,等. 云环境中跨虚拟机的 Cache 侧信道攻击技术研究[J]. 计算机学报, 2017,40(2): 317-336.
|
|
LIANG X , GUI X L , DAI H J ,et al. Research on Cache side channel attack technology of virtual machines in cloud environment[J]. Chinese Journal of Computers, 2017,40(2): 317-336.
|
[15] |
潘勇, 郭晓东 . 一种基于遗传算法改进的粒子群优化算法[J]. 计算机应用与软件, 2011,28(9): 222-224.
|
|
PAN Y , GUO X D . An improved particle swarm optimization algorithm based on genetic algorithm[J]. Computer Applications and Software, 2011,28(9): 222-224.
|
[16] |
赵硕, 季新生, 毛宇星 ,等. 基于安全等级的虚拟机动态迁移方法[J]. 通信学报, 2017,38(7): 165-174.
|
|
ZHAO S , JI X S , MAO Y X ,et al. Research on dynamic migration of virtual machine based on security level[J]. Journal on Communications, 2017,38(7): 165-174.
|