Login / Signup
VMM detection using privilege rings and benchmark execution times.
Mohsen Sharifi
Hadi Salimi
Alireza Saberi
Joobin Gharibshah
Published in:
Int. J. Commun. Networks Distributed Syst. (2013)
Keyphrases
</>
execution times
detection method
object detection
detection algorithm
real world
anomaly detection
detection rate
automatic detection
communication delays
data sets
false positives
comparative analysis
detection scheme