中文字幕在线一区二区在线,久久久精品免费观看国产,无码日日模日日碰夜夜爽,天堂av在线最新版在线,日韩美精品无码一本二本三本,麻豆精品三级国产国语,精品无码AⅤ片,国产区在线观看视频

      軟件工程畢業(yè)論文參考文獻(xiàn)

      時(shí)間:2024-10-13 10:30:04 參考文獻(xiàn) 我要投稿

      軟件工程畢業(yè)論文參考文獻(xiàn)2017

        導(dǎo)語:參考文獻(xiàn)的合理引用不僅體現(xiàn)出是作者嚴(yán)謹(jǐn)?shù)膶W(xué)術(shù)精神,還是評價(jià)論文學(xué)術(shù)水平的重要依據(jù),本文是一篇軟件工程畢業(yè)論文參考文獻(xiàn),接下來讓我們一起來看看吧~

      軟件工程畢業(yè)論文參考文獻(xiàn)2017

        [1]Biun,A.Virtualizationtechniques:AmethodicalreviewofXenandKVM[A]-CommunicationinComputerandInformationScience[C],2011:399-410

        [2]SupermanJ,VenkitachalamG,LimB.VirtualizationI/ODevicesonVMWareWorkstationHostedVirtualMachineMonitor[A].In:Proceedingofthe2001USENIXAnnualTechnicalConference(USENIXATC2001)[C]5Boston,MA,USA,2001:16-30.

        [3]Quynh?NguyenAnh.Areal-timeintegritymonitorforXenvirtualmachine[A].InternationalConferenceonNetworidngandServices2006:110-123.

        [4]Fernandes,NataliaCastro>eto.XNetMon:Anetworkmonitorforseemingvirtualnetworks[A].IEEEInternationalConferenceonCommunication[C].2011:351-356.

        [5]PayneB,CarboneM,SharifMbaxges:anarchitectureforsecureactivemonitoringusingvirtualization[A],In:ProceedingoftheIEEESymposiumonSecurityaridPrivacy,IEEEComputerSociety[Cj.Washington,DC,USA,2008:233-247

        [6]Carbone,Martim.Secureandrobustmonitoringofvirtualmachinesthroughguest-assistedintrospection[A].LectureNotesinComputerScience,2012:22-4L

        [7]Ibrahim,AmaniS.CloudSec:Asecuritymonitoringappliancefor\HirtualMachinesinthelaascloudmodel[A].InternationalConferenceonNetworkandSystemSecurity[C]-2011:113-120.

        [8]GuofbXiang,HaiJin,DeqingZou.AComprehensiveMonitoringFrameworkforVirtualtfiComputingEnvironment[A].In:Proaofthe26InternationalConferenceonInformationNetworking(IC01N2012)[C],poster,Bali,Indonesia,2012:551-556.

        [9]Vmitoolsprojecthomepage.2012.Available:

        [10]Payne,BryanD.Secureandflexiblemonitoringofvirtualmachines[A].AnnualComputerSecurityApplicationsConference,ACSAC[C].2007:385-397.

        [11]K.Lawton,B.Denney,N.D.Guarneri,V.Ruppert,C.Bothamy.Bochsx86PCEmulatorUserManual[EB/OL].

        [12]ChandraShekar,N.Fornesic.AnalysisonQUME[A].CommunicationsinComputerandInformationScience[C],2011,250:777-781.

        [13]SharifM,LeeW,CuiW,LanziA.SecureinVMmonitoringusinghardwarevirtualization[A],In:Proc.ofthe16*ACMConfonComputerandCommunicationsSecurity[C].NewYork:ACMPress,2009:477-487.

        [14]GarfinkelT,RosenblumM.Avirtualmachineintrospectionbasedarchitectureforintrusiondetection[A],In:Proc.ofthe10thNetworkandDistributedSystemSecuritySymp[C].Berkeley:USENIXAssociation,2003:191-206.

        [15]Barham,Paul.Xenandtheartofvirtualization[A].OperatingSystemReview(ACM)[C].2003,275.:164-177.

        [16]P.Barham,B,Dragovic,K.Franser,S.Hand,T.Harris,A.Ho,R.Neugebauer,I.Pratt,andA.Warfiele.Xenandtheartofvirtualization[A].ACMsymposiumonOperatingSystemsPrinciples(SISP19)[C]92003:164-180.

        [17]A.SrivastavaandV.Ganapathy.TowardsaRicherModelofCloudAppMarkets[A].ACMCCSCloudComputingSecurityWorkshop(CCSW'12)[C],2012:101-114.

        [19]項(xiàng)國富,金海,鄒德清,陳學(xué).基于虛擬化的安全監(jiān)控[J].軟件學(xué)報(bào),2012.

        [20]項(xiàng)國富.虛擬計(jì)算環(huán)境的安全監(jiān)控技術(shù)研究[DI,華中科技大學(xué),2009.

        [21]Bayer,Ulrich,etal.A\^ewoncurrentmalwarebehaviors[A].USENIXworkshoponlaige-scaleexploitsandemergentthreats(LEET)[C].2009:189-203.

        [22]曲文濤,李明祿,翁楚良,跨虛擬機(jī)的可信檢測[J],計(jì)算機(jī)科學(xué)與_索.2010-2.

        [23]BryanD.PayenMartimD.P.deA.CarboneWenkeLee.SecureandFlexibleMonitoringofVirtualMachines[A],ComputerSecurityApplicationsConference[C].2007:385-397.

        [24]GeraldJ.PopekandRobertP.C^dberg.Formalrequirementsforvirtualizablethird‘generationarchitectures[A].CommunicationsoftheACM[C],17,July1974

        [25]李狗.一個(gè)基于硬件虛擬化的內(nèi)核完整性監(jiān)控方法[J].計(jì)算機(jī)科學(xué),2011,38,(12>68-72.

        [26]BovetDP,CesatiM.UnderstandingtheLinuxKernel[M](3rdEdition)?Sebastopol:O'ReillyMediaPress,2006:75-123.57

        [27]A.SomayajiandS.Forrest.AutomatedResponseUsingSystem-CallDelays[A].InProceedingofthe9thUSENIXSecuritySymposium[C],2000:185-198.

        [28]宋寶華.Linux設(shè)備驅(qū)動(dòng)開發(fā)詳解[M].第二版.北京:人民郵電出版社,2010,11.245-317.

        [29]WolfgangMauerer.深入Linux內(nèi)核架構(gòu)[M].第一版.北京:人民郵電出版社,2010.06.413-449.

        [30]Virusandthreatsdescriptions.Rootkit[Z].Win32.Fu.

      【軟件工程畢業(yè)論文參考文獻(xiàn)】相關(guān)文章:

      軟件工程畢業(yè)論文的參考文獻(xiàn)11-27

      2016軟件工程畢業(yè)論文參考文獻(xiàn)11-14

      軟件工程論文參考文獻(xiàn)推薦03-22

      軟件工程論文參考文獻(xiàn)范例11-14

      什么是畢業(yè)論文參考文獻(xiàn)03-26

      畢業(yè)論文參考文獻(xiàn)的整理12-09

      法律畢業(yè)論文參考文獻(xiàn)11-19

      畢業(yè)論文的參考文獻(xiàn)精選范文05-16

      畢業(yè)論文的參考文獻(xiàn)作用03-28

      java畢業(yè)論文參考文獻(xiàn)05-11

      主站蜘蛛池模板: 久久久久久无中无码| 博湖县| 偷拍自拍视频一区二区三区| 建始县| 日本一区二区精品在线观看| 国产一区二区亚洲一区二区三区| 97人妻无码免费专区| 高潮喷水无遮挡毛片视频| 一区二区三无码| 屁股中文字幕一二三四区人妻| 国产成人综合久久精品推荐免费| 乐至县| 亚洲伊人不卡av在线| 熟女系列丰满熟妇av| 97久久久人妻精品区一| 亚洲欧洲无码精品ⅤA| 国内精品国产三级国产av另类| 司法| 97人妻蜜臀中文字幕| 兴宁市| 宜都市| 龙南县| 静乐县| 99久久国产一区二区三区| 永丰县| 高邮市| 国产成人自拍视频在线免费| 肇州县| 大洼县| 蜜桃av无码免费看永久| 人妻少妇中文字幕久久69堂| 亚洲专区在线观看第三页| 国产精品亚洲一区二区毛片| 91精品一区二区三区蜜桃| 亚洲精品中文有码字幕| 极品诱惑一区二区三区| 久久国产精品免费一区六九堂| 亚洲欧美国产成人综合不卡| 东方市| 一区二区三区熟女人妻| AⅤ无码精品视频|