<dfn id="w48us"></dfn><ul id="w48us"></ul>
  • <ul id="w48us"></ul>
  • <del id="w48us"></del>
    <ul id="w48us"></ul>
  • 軟件工程畢業(yè)論文參考文獻

    時間:2024-10-13 10:30:04 參考文獻 我要投稿

    軟件工程畢業(yè)論文參考文獻2017

      導語:參考文獻的合理引用不僅體現(xiàn)出是作者嚴謹?shù)膶W術(shù)精神,還是評價論文學術(shù)水平的重要依據(jù),本文是一篇軟件工程畢業(yè)論文參考文獻,接下來讓我們一起來看看吧~

    軟件工程畢業(yè)論文參考文獻2017

      [1]Biun,A.Virtualizationtechniques:AmethodicalreviewofXenandKVM[A]-CommunicationinComputerandInformationScience[C],2011:399-410

      [2]SupermanJ,VenkitachalamG,LimB.VirtualizationI/ODevicesonVMWareWorkstationHostedVirtualMachineMonitor[A].In:Proceedingofthe2001USENIXAnnualTechnicalConference(USENIXATC2001)[C]5Boston,MA,USA,2001:16-30.

      [3]Quynh?NguyenAnh.Areal-timeintegritymonitorforXenvirtualmachine[A].InternationalConferenceonNetworidngandServices2006:110-123.

      [4]Fernandes,NataliaCastro>eto.XNetMon:Anetworkmonitorforseemingvirtualnetworks[A].IEEEInternationalConferenceonCommunication[C].2011:351-356.

      [5]PayneB,CarboneM,SharifMbaxges:anarchitectureforsecureactivemonitoringusingvirtualization[A],In:ProceedingoftheIEEESymposiumonSecurityaridPrivacy,IEEEComputerSociety[Cj.Washington,DC,USA,2008:233-247

      [6]Carbone,Martim.Secureandrobustmonitoringofvirtualmachinesthroughguest-assistedintrospection[A].LectureNotesinComputerScience,2012:22-4L

      [7]Ibrahim,AmaniS.CloudSec:Asecuritymonitoringappliancefor\HirtualMachinesinthelaascloudmodel[A].InternationalConferenceonNetworkandSystemSecurity[C]-2011:113-120.

      [8]GuofbXiang,HaiJin,DeqingZou.AComprehensiveMonitoringFrameworkforVirtualtfiComputingEnvironment[A].In:Proaofthe26InternationalConferenceonInformationNetworking(IC01N2012)[C],poster,Bali,Indonesia,2012:551-556.

      [9]Vmitoolsprojecthomepage.2012.Available:

      [10]Payne,BryanD.Secureandflexiblemonitoringofvirtualmachines[A].AnnualComputerSecurityApplicationsConference,ACSAC[C].2007:385-397.

      [11]K.Lawton,B.Denney,N.D.Guarneri,V.Ruppert,C.Bothamy.Bochsx86PCEmulatorUserManual[EB/OL].

      [12]ChandraShekar,N.Fornesic.AnalysisonQUME[A].CommunicationsinComputerandInformationScience[C],2011,250:777-781.

      [13]SharifM,LeeW,CuiW,LanziA.SecureinVMmonitoringusinghardwarevirtualization[A],In:Proc.ofthe16*ACMConfonComputerandCommunicationsSecurity[C].NewYork:ACMPress,2009:477-487.

      [14]GarfinkelT,RosenblumM.Avirtualmachineintrospectionbasedarchitectureforintrusiondetection[A],In:Proc.ofthe10thNetworkandDistributedSystemSecuritySymp[C].Berkeley:USENIXAssociation,2003:191-206.

      [15]Barham,Paul.Xenandtheartofvirtualization[A].OperatingSystemReview(ACM)[C].2003,275.:164-177.

      [16]P.Barham,B,Dragovic,K.Franser,S.Hand,T.Harris,A.Ho,R.Neugebauer,I.Pratt,andA.Warfiele.Xenandtheartofvirtualization[A].ACMsymposiumonOperatingSystemsPrinciples(SISP19)[C]92003:164-180.

      [17]A.SrivastavaandV.Ganapathy.TowardsaRicherModelofCloudAppMarkets[A].ACMCCSCloudComputingSecurityWorkshop(CCSW'12)[C],2012:101-114.

      [19]項國富,金海,鄒德清,陳學.基于虛擬化的安全監(jiān)控[J].軟件學報,2012.

      [20]項國富.虛擬計算環(huán)境的安全監(jiān)控技術(shù)研究[DI,華中科技大學,2009.

      [21]Bayer,Ulrich,etal.A\^ewoncurrentmalwarebehaviors[A].USENIXworkshoponlaige-scaleexploitsandemergentthreats(LEET)[C].2009:189-203.

      [22]曲文濤,李明祿,翁楚良,跨虛擬機的可信檢測[J],計算機科學與_索.2010-2.

      [23]BryanD.PayenMartimD.P.deA.CarboneWenkeLee.SecureandFlexibleMonitoringofVirtualMachines[A],ComputerSecurityApplicationsConference[C].2007:385-397.

      [24]GeraldJ.PopekandRobertP.C^dberg.Formalrequirementsforvirtualizablethird‘generationarchitectures[A].CommunicationsoftheACM[C],17,July1974

      [25]李狗.一個基于硬件虛擬化的內(nèi)核完整性監(jiān)控方法[J].計算機科學,2011,38,(12>68-72.

      [26]BovetDP,CesatiM.UnderstandingtheLinuxKernel[M](3rdEdition)?Sebastopol:O'ReillyMediaPress,2006:75-123.57

      [27]A.SomayajiandS.Forrest.AutomatedResponseUsingSystem-CallDelays[A].InProceedingofthe9thUSENIXSecuritySymposium[C],2000:185-198.

      [28]宋寶華.Linux設(shè)備驅(qū)動開發(fā)詳解[M].第二版.北京:人民郵電出版社,2010,11.245-317.

      [29]WolfgangMauerer.深入Linux內(nèi)核架構(gòu)[M].第一版.北京:人民郵電出版社,2010.06.413-449.

      [30]Virusandthreatsdescriptions.Rootkit[Z].Win32.Fu.

    【軟件工程畢業(yè)論文參考文獻】相關(guān)文章:

    軟件工程畢業(yè)論文的參考文獻11-27

    2016軟件工程畢業(yè)論文參考文獻11-14

    軟件工程論文參考文獻推薦03-22

    軟件工程論文參考文獻范例11-14

    什么是畢業(yè)論文參考文獻03-26

    畢業(yè)論文參考文獻的整理12-09

    法律畢業(yè)論文參考文獻11-19

    畢業(yè)論文的參考文獻精選范文05-16

    畢業(yè)論文的參考文獻作用03-28

    java畢業(yè)論文參考文獻05-11

    主站蜘蛛池模板: 99久re热视频这里只有精品6| 88国产精品无码一区二区三区| 久久精品国产亚洲7777| 精品久久人人妻人人做精品| 黑人巨大精品欧美一区二区| 久久亚洲国产精品123区| 亚洲精品~无码抽插| 国产精品久久久久久搜索| 国产精品 一区 在线| 亚洲精品麻豆av| 国产精品青草久久久久婷婷 | 午夜精品视频在线| 久久精品一区二区三区中文字幕 | 亚洲AV永久精品爱情岛论坛| 亚洲精品国产精品乱码不99| 2021国产成人精品久久| 亚洲午夜精品久久久久久人妖| 久久99精品久久久久久噜噜| 人人妻人人澡人人爽欧美精品| 亚洲国产综合91精品麻豆| 宅男宅女精品国产AV天堂| 日本精品不卡视频| 伊人久久精品无码二区麻豆| 久久成人国产精品二三区| 欧美日韩精品一区二区视频| 国产偷亚洲偷欧美偷精品| 日韩精品一区二区三区不卡| 国产精品毛片久久久久久久| 亚洲欧美精品综合中文字幕| 99精品人妻少妇一区二区| 精品少妇人妻av无码久久| 免费精品精品国产欧美在线| 在线欧美v日韩v国产精品v| 精品无码人妻夜人多侵犯18| 日韩精品无码人妻一区二区三区 | 91精品福利在线观看| 久久精品黄AA片一区二区三区| 精品久久久久久无码人妻蜜桃 | 欧美精品黑人粗大视频| 亚洲国产精品久久久久| 国产精品白浆在线观看免费|