Login / Signup
On the effectiveness of virtualization-based security.
Francesco Gadaleta
Raoul Strackx
Nick Nikiforakis
Frank Piessens
Wouter Joosen
Published in:
CoRR (2014)
Keyphrases
</>
data sets
security requirements
access control
intrusion detection
operating system
information security
cloud computing environment
information assurance
data mining
e government
power consumption
smart card
sensitive data
security problems
user friendliness