共 105 条
- [41] Security in Multi-Tenancy Cloud [J]. 44TH ANNUAL 2010 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 2010, : 35 - 41
- [42] Jiang XX, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P128
- [43] Code-injection Vulnerabilities in Web Applications - Exemplified at Cross-site Scripting [J]. IT-INFORMATION TECHNOLOGY, 2011, 53 (05): : 256 - 259
- [44] SubVirt: Implementing malware with virtual machines [J]. 2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, : 314 - +
- [45] Kivity Avi, 2007, P LIN S
- [46] Klein G, 2009, SOSP'09: PROCEEDINGS OF THE TWENTY-SECOND ACM SIGOPS SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, P207
- [47] Kocher P., 1999, Differential Power Analysis, P388, DOI DOI 10.1007/3-540-48405-1_25
- [48] Kolyshkin K., 2006, CISC VIS NETW IND GL
- [49] Kook Joongjin, 2011, P 2011 ACM S APPL CO, P633
- [50] Kortchinsky K., 2009, CLOUDBURST