当前所在位置: 首页 > 参考文献 > 正文

数据库论文参考文献范例(第2页)

90 次下载 2 页 4014 字【 字体:

论文指导服务

毕业论文网专业团队提供毕业设计、论文写作指导及相关咨询服务

论文指导 毕业设计 答辩咨询
微信号已复制到剪贴板

  [10]Payne,BryanD.Secureandflexiblemonitoringofvirtualmachines[A].AnnualComputerSecurityApplicationsConference,ACSAC[C].2007:385-397.

  [11]K.Lawton,B.Denney,N.D.Guarneri,V.Ruppert,C.Bothamy.Bochsx86PCEmulatorUserManual[EB/OL].

  [12]ChandraShekar,N.Fornesic.AnalysisonQUME[A].CommunicationsinComputerandInformationScience[C],2011,250:777-781.

  [13]SharifM,LeeW,CuiW,LanziA.SecureinVMmonitoringusinghardwarevirtualization[A],In:Proc.ofthe16*ACMConfonComputerandCommunicationsSecurity[C].NewYork:ACMPress,2009:477-487.

  [14]GarfinkelT,RosenblumM.Avirtualmachineintrospectionbasedarchitectureforintrusiondetection[A],In:Proc.ofthe10thNetworkandDistributedSystemSecuritySymp[C].Berkeley:USENIXAssociation,2003:191-206.

  [15]Barham,Paul.Xenandtheartofvirtualization[A].OperatingSystemReview(ACM)[C].2003,275.:164-177.

  [16]P.Barham,B,Dragovic,K.Franser,S.Hand,T.Harris,A.Ho,R.Neugebauer,I.Pratt,andA.Warfiele.Xenandtheartofvirtualization[A].ACMsymposiumonOperatingSystemsPrinciples(SISP19)[C]92003:164-180.

  [17]A.SrivastavaandV.Ganapathy.TowardsaRicherModelofCloudAppMarkets[A].ACMCCSCloudComputingSecurityWorkshop(CCSW12)[C],2012:101-114.

  [19]项国富,金海,邹德清,陈学.基于虚拟化的安全监控[J].软件学报,2012.

  [20]项国富.虚拟计算环境的安全监控技术研究[DI,华中科技大学,2009.

阅读全文