Author:
Satra Ramdan,Syafie Lukman,Tubagus Munir
Reference22 articles.
1. X. Jiang, X. Wang and Xu D, CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security. 13, 1–28 (2007)
2. M. Fisher, M. Savva and P. Hanrahan, SIGGRAPH ’11: Proceedings ACM SIGGRAPH. 30, 1–12 (2012)
3. I, Ahmed, G.G. Richard, A. Zoranic and V Roussev, 16th International Conference, ISC Proceeding. 7807, 3–19 (2015)
4. KVM vs. LXC: Comparing Performance and Isolation of Hardware-assisted Virtual Routers
5. T. N. Savchuk, Sicience Journal of Volgograd State University. 16, 97–108 (2017)