Login / Signup
Defending against VM rollback attack.
Yubin Xia
Yutao Liu
Haibo Chen
Binyu Zang
Published in:
DSN Workshops (2012)
Keyphrases
</>
ddos attacks
virtual machine
low overhead
denial of service attacks
countermeasures
dos attacks
power analysis
malicious users
attack detection
detection mechanism
key exchange protocol
real time
multistage
multi agent
database systems
artificial intelligence
machine learning
data sets