共 50 条
- [21] Return-Oriented Programming Attack on the Xen Hypervisor [J]. 2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 479 - 484
- [22] Architectural Support for Secure Virtualization under a Vulnerable Hypervisor [J]. PROCEEDINGS OF THE 2011 44TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO 44), 2011, : 272 - 283
- [24] Secure data storage in cloud computing to avoiding some cipher text attack [J]. JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2018, 39 (04): : 843 - 855
- [28] A secure virtualization architecture based on a nested Nova hypervisor [J]. PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 279 - 285
- [29] Adversarial Attack by Limited Point Cloud Surface Modifications [J]. 2023 6TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION AND IMAGE ANALYSIS, IPRIA, 2023,
- [30] A METHOD OF ELIMINATING CLOUD INTERFERENCE IN SATELLITE STUDIES OF SEA SURFACE TEMPERATURES [J]. DEEP-SEA RESEARCH, 1969, 16 (05): : 539 - &