Guest Editorial, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2012. ,
DOI : 10.1007/s10570-006-9067-y
A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2012. ,
Virtual machines for enterprise desktop security, Information Security Technical Report, vol.11, issue.4, pp.193-202, 2006. ,
DOI : 10.1016/j.istr.2006.09.001
Formal Requirements for Virtualizable 3rd Generation Architectures, Communications of the A.C.M, vol.17, issue.7, pp.412-421, 1974. ,
DOI : 10.1145/361011.361073
Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor, Proceedings of the 9th conference on USENIX Security Symposium(USENIX'00) USENIX Association, 2000. ,
Fuzzing: Brute Force Vulnerability Discovery, 2007. ,