3Rich uhlig, Gil Neiger, Dion Rodgers. Intel virtualization technology [J]. IEEE Computer. 2005, 38(5):48-56. 被引量:1
4Smith J, Nair R. The architecture of virtual machines [J]. Computer. 2005, 38(5):32-38. 被引量:1
5Ronald Perez, Reiner Sailer, Leendert Van Doom. Virtualization and hardware-based security [J]. IEEE Security & Privacy. 2008, 6(5):24-31. 被引量:1
6Rosenblum M, Garfinkel T. Viztual machine monitors: current technology and future trends [J]. IEEE Computer Magazine, 2005, 38(5):39-47. 被引量:1
7MURRAY D, MLOS G. HAND S. Improving XEN security through disaggregation [C]. Proceedings of the 4th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. New York, NY: ACM press, 2008: 151-160. 被引量:1
8Lakshmi J, Nandy S K. I/O virtualization architecture for security [C]. 2010 10th IEEE International Conference on Computer and Information Technology (CIT). 2010:2267-2272. 被引量:1
9Mohammad Reza Ahmadi, Davood Maleki. Performance evaluation of server virtualization in data center applications [C]. 2010 5th International Symposium on Telecommunications. 2010:638-644. 被引量:1
10Ribiere A. Emulation of obsolete hardware in open source virtualization software [C]. 2010 8th IEEE International Conference on Industrial Informatics. 2010:354-360. 被引量:1