共 12 条
[1]
Akoush Sherif, 2010, Proceedings 18th IEEE/ACM International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS 2010), P37, DOI 10.1109/MASCOTS.2010.13
[2]
[Anonymous], 2010, INTERNET MEASUREMENT, DOI DOI 10.1145/1879141.1879143
[3]
HyperSentry: Enabling Stealthy In-context Measurement of Hypervisor Integrity
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:38-49
[4]
Brandic I., 2010, P 34 ANN IEEE COMP S, P366
[5]
Goldberg S, 2008, PERF E R SI, V36, P193, DOI 10.1145/1384529.1375480
[6]
Martin J, 2002, IEEE INFOCOM SER, P855, DOI 10.1109/INFCOM.2002.1019332
[7]
Mell P., 2011, NIST DEFINITION CLOU, P7
[9]
SHAIKH A, 2005, ACM SIGCOMM TUT SESS