Login / Signup
Transparent Security-Sensitive Process Protection via VMM-Based Process Shadowing.
Xiaoguang Wang
Yong Qi
Yue-hua Dai
Jianbao Ren
Published in:
COMPSAC Workshops (2013)
Keyphrases
</>
real world
database
data sets
databases
neural network
search engine
social networks
case study
expert systems