共 50 条
- [1] Mean Time to Security Failure of VM-Based Intrusion Tolerant Systems 2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2016), 2016, : 128 - 133
- [2] Survivability Analysis of VM-Based Intrusion Tolerant Systems IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2015, E98D (12): : 2082 - 2090
- [3] Performance Evaluation of VM-Based Intrusion Tolerant Systems with Poisson Arrivals 2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2016, : 181 - 187
- [4] Analysis of VM Communication for VM-based Cloud Security Systems 2018 FIFTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2018, : 182 - 188
- [5] Security Evaluation of a VM-Based Intrusion-Tolerant System with Pull-Type Patch Management 201919TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2019), 2019, : 156 - 163
- [6] VM-based Security Overkill: A Lament for Applied Systems Security Research NEW SECURITY PARADIGMS WORKSHOP 2010, 2010, : 51 - 60
- [8] Towards a Formally Verified Security Monitor for VM-based Confidential Computing PROCEEDINGS OF THE 12TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP 2023, 2023, : 73 - 81
- [9] A VM-based Approach for Real-Time EtherCAT Control 2014 CACS INTERNATIONAL AUTOMATIC CONTROL CONFERENCE (CACS 2014), 2014, : 344 - 348
- [10] Security attributes analysis for intrusion tolerant systems Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1505 - 1512