Author:
Xie Jiajun,Zhang Chunrui,Lou Fang,Cui Yu,An Lun,Wang Le
Publisher
Springer International Publishing
Reference23 articles.
1. NIST.
https://www.nist.gov/sites/default/files/documents/2018/02/13/cyber_ranges.pdf
. Accessed 03 Mar 2018
2. Binxing, F., Yan, J., Aiping, L., Weizhe, Z.: Cyber ranges: state-of-the-art and research challenges. J. Cyber Secur. 1(3), 1–9 (2016)
3. Hu, Y., Jin, H., Yu, Z., et al.: An optimization approach for QEMU. In: 2009 1st International Conference on Information Science and Engineering (ICISE), pp. 129–132. IEEE (2009)
4. Bushouse, M., Reeves, D.: Hyperagents: migrating host agents to the hypervisor. In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, pp. 212–223. ACM (2018)
5. Holler, A., Krieg, A., Rauter, T., et al.: QEMU-based fault injection for a system-level analysis of software countermeasures against fault attacks. In: 2015 Euromicro Conference on Digital System Design (DSD), pp. 530–533. IEEE (2015)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献