Cloud computing for IoT (Internet of Things) has exhibited the greatest growth in the IT market in the recent past and this trend is expected to continue. Many companies are adopting a virtual desktop infrastructure (VDI) for private cloud computing to reduce costs and enhance the efficiency of their servers. As a VDI is widely used, threats of cyber terror and invasion are also increasing. To minimize the damage, response procedure for cyber intrusion on a VDI should be systematized. Therefore, we propose an investigation methodology for VDI solutions in this paper. Here we focus on a virtual desktop infrastructure and introduce various desktop virtualization solutions that are widely used, such as VMware, Citrix, and Microsoft. In additio...
With an increasing number of personal computers introduced in schools, enterprises and other large o...
Infrastructure as a Service and memory forensics are two subjects which have recently gained increas...
Traditional digital forensics techniques are becoming obsolete due to rapid technological change. Pr...
The development of virtualization started in 1960, when VMware introduced partitioning of large main...
This article presents an overview of some of the major works that focus on the use of virtualization...
Virtualization in computing has progressed to an extent where desktops can be virtualized and access...
Cloud computing is a heavily evolving topic in information technology (IT). Rather than creating, de...
The security perimeter in computing has changed from a fixed boundary to an elastic boundary that is...
Identifying and acquiring data stored in a cloud environment is a complicated and challenging proces...
Cloud computing discusses about sharing any imaginable entity such as process units, storage devices...
Unfortunately, the nature of the cloud is in conflict with the characteristic of digital forensic in...
Kernel-based Virtual Machine (KVM) is one of the most popular hypervisors used by cloud providers to...
This thesis is about investigating Virtual Desktop Infrastructure, the technologies involved with it...
Cloud Computing is being considered as emerging technology in recent times and defines a new IT mode...
Cloud Computing is the emerging technology in IT which aims more and more users to be part of it. Cl...
With an increasing number of personal computers introduced in schools, enterprises and other large o...
Infrastructure as a Service and memory forensics are two subjects which have recently gained increas...
Traditional digital forensics techniques are becoming obsolete due to rapid technological change. Pr...
The development of virtualization started in 1960, when VMware introduced partitioning of large main...
This article presents an overview of some of the major works that focus on the use of virtualization...
Virtualization in computing has progressed to an extent where desktops can be virtualized and access...
Cloud computing is a heavily evolving topic in information technology (IT). Rather than creating, de...
The security perimeter in computing has changed from a fixed boundary to an elastic boundary that is...
Identifying and acquiring data stored in a cloud environment is a complicated and challenging proces...
Cloud computing discusses about sharing any imaginable entity such as process units, storage devices...
Unfortunately, the nature of the cloud is in conflict with the characteristic of digital forensic in...
Kernel-based Virtual Machine (KVM) is one of the most popular hypervisors used by cloud providers to...
This thesis is about investigating Virtual Desktop Infrastructure, the technologies involved with it...
Cloud Computing is being considered as emerging technology in recent times and defines a new IT mode...
Cloud Computing is the emerging technology in IT which aims more and more users to be part of it. Cl...
With an increasing number of personal computers introduced in schools, enterprises and other large o...
Infrastructure as a Service and memory forensics are two subjects which have recently gained increas...
Traditional digital forensics techniques are becoming obsolete due to rapid technological change. Pr...