Citations in impact factor journals
Evaluation of isolation in virtual machine environments
encounter in effective attacks against memory Security and Communication Networks Vol. 8, Issue 18, 4396, 2015 |
Citation to this article as recorded by
A Novel Intrusion Tolerant System Using Live
Migration IEICE Transactions on Information and Systems Vol. E97.D, Issue 4, 984, 2014 |
How to cite this article
Jian-Hua Huang, Jun Huang, Rong Li and Xiao-Ming Li, 2013. Virtualization-based Recovery Approach for Intrusion Tolerance. Information Technology Journal, 12: 385-390.
DOI: 10.3923/itj.2013.385.390
URL: https://scialert.net/abstract/?doi=itj.2013.385.390
DOI: 10.3923/itj.2013.385.390
URL: https://scialert.net/abstract/?doi=itj.2013.385.390