Login / Signup
Circumventing cryptography in virtualized environments.
Brian Hay
Kara L. Nance
Published in:
MALWARE (2012)
Keyphrases
</>
cellular automata
highly dynamic
real world
information security
cloud computing
virtual machine
data center
dynamic environments
management system
image segmentation
information retrieval
database
mobile robot
data structure
decision making
databases
resource management
data sets