
Hamdy Ahmed
Articles
-
Jan 13, 2025 |
mdpi.com | Hamdy Ahmed |Taher A Nofal |Adel Darwish |Othman A. M
1. IntroductionIn cloud computing, virtualization is a crucial method that enables the transcendence of temporal and physical boundaries. It accomplishes this by splitting a single physical computing resource into several virtual machines (VMs) with identical functions. This enables VM migration [1] to enable the on-demand deployment of computing resources. Regretfully, malware attacks are becoming more frequent targets for the new hidden risks that virtualization has brought about [2].
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →