Login / Signup

Hiding "real" machine from attackers and malware with a minimal virtual machine monitor.

Yan WenJinjing ZhaoHuaimin Wang
Published in: SecureComm (2008)
Keyphrases
  • malware detection
  • real world
  • database
  • machine learning
  • information retrieval
  • artificial intelligence
  • multiscale
  • real life
  • virtual machine