Login / Signup
Hiding "real" machine from attackers and malware with a minimal virtual machine monitor.
Yan Wen
Jinjing Zhao
Huaimin Wang
Published in:
SecureComm (2008)
Keyphrases
</>
malware detection
real world
database
machine learning
information retrieval
artificial intelligence
multiscale
real life
virtual machine