Cited By
View all- Zaidenberg NKiperberg MResh A(2022)TrulyProtect—Virtualization-Based Protection Against Reverse EngineeringCyber Security10.1007/978-3-030-91293-2_15(353-366)Online publication date: 3-Apr-2022
- Khan HAli FNazir S(2022)Systematic analysis of software development in cloud computing perceptionsJournal of Software: Evolution and Process10.1002/smr.2485Online publication date: 29-Jun-2022
- Hosseinzadeh SSequeiros BInácio PLeppänen V(2019)Recent trends in applying TPM to cloud computingSECURITY AND PRIVACY10.1002/spy2.933:1Online publication date: 28-Nov-2019
- Show More Cited By