1. 2016. Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage. https://www.usenix.org/sites/default/files/conference/protected-files/security16_slides_garman.pdf. (2016). 2016. Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage. https://www.usenix.org/sites/default/files/conference/protected-files/security16_slides_garman.pdf. (2016).
2. 2017. Amazon EC2 Bare Metal Instances. https://aws.amazon.com/blogs/aws/new-amazon-ec2-bare-metal-instances-with-direct-access-to-hardware/. (2017). 2017. Amazon EC2 Bare Metal Instances. https://aws.amazon.com/blogs/aws/new-amazon-ec2-bare-metal-instances-with-direct-access-to-hardware/. (2017).
3. 2018. Alibaba Cloud ECS Bare Metal Instance. https://www.alibabacloud.com/product/ebm/. (2018). 2018. Alibaba Cloud ECS Bare Metal Instance. https://www.alibabacloud.com/product/ebm/. (2018).
4. 2020. Alibaba Cloud EBS performance. https://www.alibabacloud.com/help/en/doc-detail/25382.html. (2020). 2020. Alibaba Cloud EBS performance. https://www.alibabacloud.com/help/en/doc-detail/25382.html. (2020).
5. 2020. Amazon EBS features. https://aws.amazon.com/ebs/features/. (2020). 2020. Amazon EBS features. https://aws.amazon.com/ebs/features/. (2020).