A Study on Machine Learning Based Light Weight Authentication Vector
How to cite (IJASEIT) :
IDC(International Data Corporation), Worldwide Semiannual Cognitive/Artificial Intelligence Systems Spending Guide, 2016.
Danial Hooshyar, Moslem Yousefi, and Heuiseok Lim, “Data-driven Approaches to Game Player Modeling: A Systematic Literature Review”, ACM Computing Surveys 50(6), 2017, pp. 1-19.
Yeongwook Yang, Wonhee Yu, and Heuiseok Lim, “Predicting Second Language Proficiency Level Using Linguistic Cognitive Task and Machine Learning Techniques”, Wireless Personal Communications: An International Journal, 86(1), 2016, pp. 271-285.
OWL Cyber Security, OWL Cybersecurity Launches Darknet Index Reranking the Fortune 500 by Darknet Footprint and Security Threat Levels, 2017.
Dakota Rudesill, James Caverlee, Daniel Sui, The Deep Web and the Darknet: A Look Inside the Internet's Massive Black Box, Science+Technology Innovation Program, 2015.
Peter Harrington, Machine Learning in Action, black & white, 2012.
Shai Shalev-Shwartz and Shai Ben-David, “Understanding Machine Learning: From Thory to Algorithms”, Cambridge University Press, 2014.
Leonardo Araujo dos Santos, Artificial Intelligence, GitBook, 2017.
BENGIO, Yoshua, et al, Learning deep architectures for AI, Foundations and trends® in Machine Learning, 2(1), 2009, pp. 1-127.
VMWARE, Virtualization Overview, Vmware White Paper, 2006.
Fayyad-Kazan, Hasan, Luc Perneel, and Martin Timmerman, Benchmarking the performance of Microsoft Hyper-V server, VMware ESXi and Xen hypervisors, Journal of Emerging Trends in Computing and Information Sciences, 4(12), 2013, pp. 922-933.
Graziano, Charles David. A performance analysis of Xen and KVM hypervisors for hosting the Xen Worlds Project, 2011.
Zhang, Minjie, and Raj Jain, Virtualization security in data centers and clouds, http://www.cse.wustl.edu/~jain/index.html, 2011.
Sabahi, Farzad, Secure virtualization for cloud environment using hypervisor-based technology, International Journal of Machine Learning and Computing, 2(1), 2012, pp. 39-45.
Bhunia, Swarup, et al, Hardware Trojan attacks: threat analysis and countermeasures, Proceedings of the IEEE, 102(8), 2014, pp. 1229-1247.
Nguyen, Anh M., et al, Mavmm: Lightweight and purpose built vmm for malware analysis, Computer Security Applications Conference, ACSAC'09, Annual. IEEE, 2009.
Garfinkel, Tal, and Mendel Rosenblum, A Virtual Machine Introspection Based Architecture for Intrusion Detection, Ndss. 3, 2003, pp. 191-206.
Hwang, T., Shin, Y., Son, K., & Park, H, Design of a hypervisor-based rootkit detection method for virtualized systems in cloud computing environments, In Proceedings of the 2013 AASRI Winter International Conference on Engineering and Technology, 2013, pp. 27-32.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).