Login / Signup
Rescuing the End-user systems from Vulnerable Applications using Virtualization Techniques.
Vinayak Trivedi
Tushar Gurjar
Sumaiya Shaikh
Saketh Maddamsetty
Debadatta Mishra
Published in:
CoRR (2022)
Keyphrases
</>
end users
user requirements
application development
user interface
operating system
business intelligence
user experience
user driven
management system
web applications
distributed systems
content providers
decision makers
service providers
computing systems