Quick links

Cloud security and security of virtualized systems

Cloud security and security of virtualized systems

Security frameworks and controls for cloud and virtualized systems


Dr. Sergey Butakov

Sample research papers

  1. Darine Ameyed, Fehmi Jaafar, and Jaouhar Fattahi. A Slow Read Attack Using Cloud. The International Conference on Electronics, Computers and Artificial Intelligence. June 2015, Bucharest, Romania.
  2. Vimal Kumar SathiyaBalan, Pavol Zavarsky, Dale Lindskog, Sergey Butakov, Study of Applicability of Chinese Remainder Theorem based Group Key Management for Cloud Environment, 10th IEEE International Conference for Internet Technology and Secured Transactions (ICITST-2015), London, UK, Dec. 14-16, 2015
  3. Iain Kyte, Pavol Zavarsky, Dale Lindskog, Ron Ruhl, Enhanced Side-channel Analysis Method to Detect Hardware Virtualization Based Rootkits, Proc. World Congress on Internet Security WorldCIS 2012, Guelf, Ontario, Canada, June 10 -12, 2012
  4. Fares N. Almari, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Amer Aljaedi, Performance Analysis of Oracle Database in Virtual Environment, Proc. 26th IEEE International Conference on Advanced Information Networking and Applications (AINA-2012), Fukuoka, Japan, March 26-29, 2012
  5. Emmanuel Ibidokun, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Performance Evaluation of Oracle VM Server Virtualization Software in 64 bit Linux Environment, Proc. International Workshop on Security Measurement and Metric 2011 (MetriSec ‘11), Banff, AB, Canada, September 21, 2011
  6. Omotayo T. Ogundare, Ron Ruhl, Dale Lindskog, Pavol Zavarsky, Analysis of High Availability Solutions within the VMware Virtualized Infrastructure Architecture, Proc. International Conference on Information Security and Privacy (ISP-10), pp. 50-57, ISBN: 978-1-60651-021-6, Orlando, Florida, USA, July 12-14, 2010