Author:
Lin Zhi,Song Yubo,Wang Junbo
Publisher
Springer International Publishing
Reference14 articles.
1. Alnaim, A.K., Alwakeel, A.M., Fernandez, E.B.: A pattern for an NFV virtual machine environment. In: 2019 IEEE International Systems Conference (SysCon), pp. 1–6. IEEE (2019)
2. Asvija, B., Eswari, R., Bijoy, M.: Security in hardware assisted virtualization for cloud computing-state of the art issues and challenges. Comput. Netw. 151, 68–92 (2019)
3. Lecture Notes in Computer Science;M Brengel,2016
4. Favre, O., Tellenbach, B., Asenz, J.: Honey-copy: a concept and prototype of a generic honeypot system. In: ICIMP 2017 the Twelfth International Conference on Internet Monitoring and Protection, Venice, Italy, 25–29 July 2017, pp. 7–11. IARIA (2017)
5. Franklin, J., Luk, M., McCune, J.M., Seshadri, A., Perrig, A., Van Doorn, L.: Remote detection of virtual machine monitors with fuzzy benchmarking. ACM SIGOPS Oper. Syst. Rev. 42(3), 83–92 (2008)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献