共 176 条
[1]
Abed A.S., 2015, Globecom Workshops (GC Wkshps), P1
[2]
Aciiçmez O, 2007, CSAW'07: PROCEEDINGS OF THE 2007 ACM COMPUTER SECURITY ARCHITECTURE WORKSHOP, P11
[3]
Aciiçmez O, 2007, LECT NOTES COMPUT SC, V4377, P271
[4]
Aciiçmez O, 2006, LECT NOTES COMPUT SC, V4307, P112
[5]
Aciiçmez O, 2010, LECT NOTES COMPUT SC, V6225, P110, DOI 10.1007/978-3-642-15031-9_8
[6]
Aciiçqmez O, 2008, LECT NOTES COMPUT SC, V4964, P256, DOI 10.1007/978-3-540-79263-5_16
[7]
Alam M., 2017, IACR Cryptol. ePrint Arch.
[8]
ConfMVM: A Hardware-Assisted Model to Confine Malicious VMs
[J].
2018 UKSIM-AMSS 20TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM),
2018,
:49-54
[9]
Allaf Zirak, 2017, Advances in Computational Intelligence, P203
[10]
Amplifying Side Channels Through Performance Degradation
[J].
32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016),
2016,
:422-435