Login / Signup

A Study of Security Isolation Techniques.

Rui ShuPeipei WangSigmund Albert Gorski IIIBenjamin AndowAdwait NadkarniLuke DeshotelsJason GiontaWilliam EnckXiaohui Gu
Published in: ACM Comput. Surv. (2016)
Keyphrases
  • experimental study
  • database systems
  • statistical analysis
  • information security
  • neural network
  • mobile devices
  • security issues