共 50 条
- [1] Implementation of Virtual Time System for the Distributed Virtual Machine Monitor [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 571 - 576
- [2] On recognizing virtual honeypots and countermeasures [J]. DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 211 - 218
- [3] Is Your Virtual Machine Monitor Secure? [J]. APTC 2008: THIRD ASIA-PACIFIC TRUSTED INFRASTRUCTURE TECHNOLOGIES CONFERENCE, PROCEEDINGS, 2008, : 5 - 5
- [4] Research on Mechanism of Deploying Virtual Machine in the Mode of IaaS [J]. 2013 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND MANAGEMENT SCIENCE (ICIEMS 2013), 2013, : 1187 - 1193
- [5] Load Balancing in Xen Virtual Machine Monitor [J]. CONTEMPORARY COMPUTING, PT 2, 2010, 95 : 62 - +
- [6] SIVARM: a Virtual Machine Monitor for the ARM Architecture [J]. TENCON 2010: 2010 IEEE REGION 10 CONFERENCE, 2010, : 1088 - 1093
- [7] Design of Virtual Machine Monitor for Embedded Systems [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 1629 - 1632
- [8] Performance Evaluation for Deploying Docker Containers On Baremetal and Virtual Machine [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES 2018), 2018, : 1019 - 1023
- [9] Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection [J]. SECURE IT SYSTEMS, 2018, 11252 : 255 - 271
- [10] Automated dynamic redistribution of virtual operating systems under the xen virtual machine monitor [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2007, : 190 - +