Cited By
View all- Wong YShen QLi CLiu CAi T(2023)Detecting Malicious Migration on Edge to Prevent Running Data LeakageICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)10.1109/ICASSP49357.2023.10095432(1-5)Online publication date: 4-Jun-2023
- Unoki TKourai K(2023)VM Migration Support for Secure Out-of-Band VNC with Shadow Devices2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361346(0298-0305)Online publication date: 14-Nov-2023
- Huseynov HSaadawi TKourai K(2021)Hardening the Security of Multi-Access Edge Computing through Bio-Inspired VM IntrospectionBig Data and Cognitive Computing10.3390/bdcc50400525:4(52)Online publication date: 8-Oct-2021
- Show More Cited By