4Masahiko Mori.Optical network-based technology to reduce power consumption[J].AIST Today,2010,2(36):7-8. 被引量:1
5Denatious D K,John A.Survey on data mining techniques to enhance intrusion detection[C]//International Conference on Computer Communication and Informatics (ICCCI).Coimbatore (India):[s.n.],2012:1-5. 被引量:1
6Lawton K,Denney B,Guarneri N D,et al.Bochs User Manual[DB/OL].(2012-09-17)[2013-08-12].SourceForge.http://sar.informatik.hu-berlin.de/teaching/neu-etc/osp1/labs/references/bochs-user_manual.htm. 被引量:1
8Nanda S,Li W,Lam L C,et al.BRID:binary interpretation using runtime disassembly[C]//Proceeding of the International Symposium on Code Generation and Optimization.New York (USA):[s.n.].2006:26-29. 被引量:1
10Whitaker A,Shaw M,Gribble S D.Denali:Lightweight virtual machines for distributed and networked applications[C]// In Proceedings of the USENIX Annual Technical Conference.Monterey (USA):USENIX,2002:1-14. 被引量:1