Covert Channels Implementation and Detection in Virtual Environments
暂无分享,去创建一个
[1] Barrie Sosinsky,et al. Cloud Computing Bible , 2010 .
[2] Patrick F. Dunn,et al. Measurement and Data Analysis for Engineering and Science , 2017 .
[3] Rajkumar Buyya,et al. High Performance Cluster Computing , 1999 .
[4] Tim Mather,et al. Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.
[5] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[6] Rajeswari Goudar,et al. Covert Channels:" Emerged in mystery and departed in confusion" , 2011 .
[7] Steven J. Murdoch,et al. Internet Censorship and Control [Guest editors' introduction] , 2013, IEEE Internet Comput..
[8] Yongji Wang,et al. C2Detector: a covert channel detection framework in cloud computing , 2014, Secur. Commun. Networks.
[9] Luis Rodero-Merino,et al. A break in the clouds: towards a cloud definition , 2008, CCRV.
[10] Barrie Sosinsky. Cloud Computing Bible: Sosinsky/Cloud , 2010 .