Login / Signup

Transparent Security-Sensitive Process Protection via VMM-Based Process Shadowing.

Xiaoguang WangYong QiYue-hua DaiJianbao Ren
Published in: COMPSAC Workshops (2013)
Keyphrases
  • real world
  • database
  • data sets
  • databases
  • neural network
  • search engine
  • social networks
  • case study
  • expert systems