Login / Signup

Evaluation of isolation in virtual machine environments encounter in effective attacks against memory.

Mir Alireza HakamianAmir Masoud Rahmani
Published in: Secur. Commun. Networks (2015)
Keyphrases
  • virtual machine
  • virtual memory
  • java card
  • operating system
  • computing resources
  • cloud computing environment
  • data center
  • data structure
  • data management
  • data processing
  • cost effective