共 35 条
[1]
Akinbi A, 2013, INT CONF INTERNET, P162, DOI 10.1109/ICIST.2013.6747532
[2]
Al Awadhi E, 2013, IEEE GCC CONF EXHIB, P251, DOI 10.1109/IEEEGCC.2013.6705785
[3]
Multi-Tenancy in Cloud Computing
[J].
2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE),
2014,
:344-351
[4]
[Anonymous], 2012, Cross-VM Side Channels and Their Use to Extract Private Keys, Computer and communications security", p, DOI DOI 10.1145/2382196.2382230
[5]
Badis H, 2014, NETW OP MAN S NOMS 2, V1, P5
[6]
DKSM: Subverting Virtual Machine Introspection for Fun and Profit
[J].
2010 29TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS SRDS 2010,
2010,
:82-91
[7]
Shielding Applications from an Untrusted Cloud with Haven
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2015, 33 (03)
[8]
Booth G, 2013, 2013 8 ANN S INF ASS
[9]
Understanding DDoS Attack & Its Effect In Cloud Environment
[J].
PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL(ICAC3'15),
2015, 49
:202-210