Cited By
View all- Kumar AYadav RRaghava N(2024)FLOLSTM: Fuzzy logic‐driven optimized LSTM for improved malicious traffic detection in hypervisor environmentsConcurrency and Computation: Practice and Experience10.1002/cpe.8194Online publication date: 6-Jun-2024
- Koga YKourai K(2023)SSdetector: Secure and Manageable Host-based IDS with SGX and SMM2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom60117.2023.00086(539-548)Online publication date: 1-Nov-2023
- Lin KLiu WZhang KTu B(2023)HyperPS: A Virtual-Machine Memory Protection Approach Through Hypervisor's Privilege SeparationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.320020620:4(2925-2938)Online publication date: 1-Jul-2023
- Show More Cited By