Login / Signup
Evaluation of isolation in virtual machine environments encounter in effective attacks against memory.
Mir Alireza Hakamian
Amir Masoud Rahmani
Published in:
Secur. Commun. Networks (2015)
Keyphrases
</>
virtual machine
virtual memory
java card
operating system
computing resources
cloud computing environment
data center
data structure
data management
data processing
cost effective