Login / Signup
A Study of Security Isolation Techniques.
Rui Shu
Peipei Wang
Sigmund Albert Gorski III
Benjamin Andow
Adwait Nadkarni
Luke Deshotels
Jason Gionta
William Enck
Xiaohui Gu
Published in:
ACM Comput. Surv. (2016)
Keyphrases
</>
experimental study
database systems
statistical analysis
information security
neural network
mobile devices
security issues