共 12 条
[1]
Ajayi O., 2021, 2021 INT S NETW COMP
[2]
Secure Architecture for Inter-Healthcare Electronic Health Records Exchange
[J].
2020 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS 2020),
2020,
:531-536
[3]
Ajayi O, 2020, 2020 7TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD 2020)/2020 6TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (EDGECOM 2020), P100, DOI [10.1109/cscloud-edgecom49738.2020.00025, 10.1109/CSCloud-EdgeCom49738.2020.00025]
[4]
Secured Cyber-Attack Signatures Distribution using Blockchain Technology
[J].
2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019),
2019,
:482-488
[5]
Huseynov H., 2020 IEEE 21 INT C H
[6]
Kourai K, 2016, IEEE INT CONF CLOUD, P43, DOI [10.1109/CLOUD.2016.14, 10.1109/CLOUD.2016.0016]
[7]
Efficient VM Introspection in KVM and Performance Comparison with Xen
[J].
2014 20TH IEEE PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2014),
2014,
:192-202
[8]
Lantz B., 2010, PROC 9 ACM SIGCOMM W, P1
[9]
Sanatinia A, 2017, 2017 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST)