共 50 条
- [41] CloudShelter: Protecting Virtual Machines' Memory Resource Availability in Clouds 2017 IEEE 35TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2017, : 557 - 564
- [42] Virtual machines consolidation and placement based on constraint satisfaction in the clouds J. Comput. Inf. Syst., 14 (5251-5258):
- [43] Securing Open Source Clouds Using Models ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2018, (271): : 80 - 94
- [45] OPEN SOURCE SOLUTIONS FOR BUILDING IAAS CLOUDS SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2015, 16 (02): : 187 - 204
- [46] System Security Assessment Method Integrating Risk Relationships of Open Source Software 2024 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA 2024, 2024, : 21 - 27
- [47] Implementation of the "Virtual Camber" Transformation into the Open Source Software QBlade: Validation and Assessment ATI 2018 - 73RD CONFERENCE OF THE ITALIAN THERMAL MACHINES ENGINEERING ASSOCIATION, 2018, 148 : 210 - 217
- [48] On the Security of Python']Python Virtual Machines: An Empirical Study 2022 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2022), 2022, : 223 - 234
- [49] A Lightweight Security Isolation Approach for Virtual Machines Deployment INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 516 - 529
- [50] Improving Security of Virtual Machines during Live Migrations 2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2013, : 352 - 357