Login / Signup
Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual Machine.
Matrazali Noorafiza
Hiroshi Maeda
Ryuya Uda
Toshiyuki Kinoshita
M. Shiratori
Published in:
ICISSP (2015)
Keyphrases
</>
virtual machine
resource utilization
operating system
data center
cloud computing environment
network access
low latency
computing resources
distributed computing
virtual memory
virtual machine monitor
peer to peer
network structure
java card
java virtual machine
windows xp
information systems