archive-org.com » ORG » I » IJORCS.ORG

Total: 231

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • An Enhancement to Cleanroom Software Engineering using csUnit Tool
    International Journal of Research in Computer Science 3 no 5 2013 19 23 doi 10 7815 ijorcs 35 2013 071 Close Abstract Clean room software engineering is a technical and managerial process for the development of high quality software for zero defects with certified reliability which combines the correctness verifications and statistical usage testing to certify the software fitness This paper describes the clean room software engineering along with its technology processes tools support and its comparison with other traditional approaches advantages and disadvantages In this paper is presenting the detail description of Clean room Software Engineering and Object Oriented Technology and also the experimental study of collaborative engineering and mutation testing performed through csUnit tool integrated with Visual studio 2008 which have been introduced to enhanced or improved Clean room Software Engineering References Cited By Murphy P A Review of Clean room Software Engineering Citeseer 2007 Dyer M The Clean room Approach to Quality Software Development Wiley 1992 Deck M D Cleanroom Software Engineering Quality Improvement and Cost Reduction Proc of Pacific Northwest Software Quality Conference October 1994 pp 243 258 doi 10 1 1 104 8072 Hausler P A A Recent Clean room Success Story The Redwing Project Proc 17th Annual Software Engineering Workshop NASA Goddard Space Flight Centre December 1992 Fagan M E Design and Code Inspections to Reduce Errors in Program Development IBM Systems Journal vol 15 no 3 1976 pp 219 249 doi 10 1147 sj 382 0258 Votta L G Jr Does Every Inspection Need a Meeting Software Engineering Notes D Notkin ed Vol 19 No 5 pp 107 114 doi 10 1145 167049 167070 Porter A H Siy C A Toman and L G Votta An Experiment to Assess the Cost Benefits of Code Inspections in Large Scale Software Development ACM SIGSOFT 95

    Original URL path: http://www.ijorcs.org/manuscript/id/71/pooja-manocha-arun-jain/an-enhancement-to-cleanroom-software-engineering-using-csunit-tool (2016-05-01)
    Open archived version from archive


  • A Robust and Adaptable Method for Face Detection Based on Color Probabilistic Estimation Technique
    optimal threshold tuning Then from the skin region facial features have been extracted to get the face from the skin region In the results section the proposed approach is applied on FEI database and the accuracy rate reached 99 25 The proposed approach can be used for all kinds of skin using train stage which is the main advantage among the other advantages such as Low noise sensitivity and low computational complexity References Cited By S L Phung A Bouzerdoum and D Chai Skin Segmentation Using Color and Edge Information In Proc of International Symposium on Signal Processing and its Applications Vol 1 Paris France 2003 pp 525 528 P Kakumanu S Makrogiannis and N Bourbakis A Survey of Skin color Modeling and Detection Methods Pattern Recognition Vol 40 pp 1106 1122 2007 doi 10 1016 j patcog 2006 06 010 L Sigal S Sclaroff and V Athitsos Skin Color based Video Segmentation Under time varying Illumination IEEE Transaction on Pattern Analysis and Machine Intelligence Vol 26 No 6 pp 862 877 2004 doi 10 1109 TPAMI 2004 35 R L Hsu M Abdel Mottaleb and A K Jain Face detection in color Images IEEE Transaction on Pattern Analysis and Machine Intelligence Vol 24 No 5 pp 696 706 2002 Z Qiang Ch Kwang Ting W Ching Tung and W Yi Leh Adaptive learning of an accurate skin color model In Proc of the Sixth IEEE international conference on automatic face and gesture recognition Seoul Korea 2004 pp 37 42 M H Yang and N Ahuja Gaussian mixture model for human skin color and its applications in image and video databases In Proc of SPIE Storage and Retrieval for Image and Video Databases pp 458 466 Jan 1999 H Wu Q Chen and M Yachida Face detection from color images using a fuzzy pattern matching method IEEE Transaction on Pattern Analysis and Machine Intelligence Vol 21 No 6 pp 557 563 1999 Crowley J L and Coutaz J Vision for Man Machine Interaction Robotics and Autonomous Systems Vol 19 pp 347 358 1997 doi 10 1016 S0921 8890 96 00061 9 Cahi D and Ngan K N Face Segmentation Using Skin Color Map in Videophone Applications IEEE Transaction on Circuit and Systems for Video Technology Vol 9 pp 551 564 1999 Kjeldsen R and Kender J Finding Skin in Color Images Proceedings of the Second International Conference on Automatic Face and Gesture Recognition 1996 pp 312 317 doi 10 1109 AFGR 1996 557283 M A Akhloufi X Maldague and W B Larbi A New Color Texture Approach for Industrial Products Inspection Journal of multimedia Vol 3 No 3 pp 44 50 July 2008 doi 10 4304 jmm 3 3 44 50 H Y Patil S V Bharambe A G Kothari and K M Bhurchandi Face Localization and its Implementation on Embedded Platform 3rd IEEE International Advance Computing Conference IACC 2013 pp 741 745 doi 10 1109 IAdCC 2013 6514319 R Azad H R Shayegh Novel and Tuneable Method for Skin

    Original URL path: http://www.ijorcs.org/manuscript/id/72/reza-azad-fatemeh-davami/a-robust-and-adaptable-method-for-face-detection-based-on-color-probabilistic-estimation-technique (2016-05-01)
    Open archived version from archive

  • A Two-Level Autonomous Intrusion Detection Model Inspired by the Immune System
    system whose autonomous agents do not need maintenance and detects intrusions without relying on any other central elements just by using their own learning and interaction capability References Cited By U A Sandhu A Haider S Naseer O U Ateeb A Survey of Intrusion Detection Prevention Techniques 16th Singapore International Conference on Information Communication and Management 2011 pp 66 71 M Roesch Snort Lightweight Intrusion Detection for Networks 13th Washington USENIX conference on System administration 1999 pp 229 238 L Panait S Luke Cooperative Multi Agent Learning The State of the Art Autonomous Agents and Multi Agent Systems 11 3 pp 387 434 November 2005 doi 10 1007 s10458 005 2631 2 L N de Castro F J Von Zuben Learning and Optimization using the Clonal Selection Principles IEEE Transactions on Evolutionary Computation 6 3 pp 239 251 June 2002 doi 10 1109 TEVC 2002 1011539 L N de Castro F J Von Zuben aiNet an Artificial Immune Network for Data Analysis In Abbass H A Sarker R A Newton C S Eds Data Mining A Heuristic Approach pp 231 259 Idea Group Publishing USA 2001 P K Harmer P D Williams G H Gunsch G B Lamont A Artificial Immune System Architecture for Computer Security Applications IEEE Transactions on Evolutionary Computation 6 3 pp 252 280 June 2002 doi 10 1109 TEVC 2002 1011540 G Funk A Barbour H Hengartner U Kalinke Mathematical Model of a Virus Neutralizing Immunglobulin Response Journal of theoretical biology 195 1 pp 41 52 November 1998 doi 10 1006 jtbi 1998 0779 S Forrest C Beauchemin Computer Immunology Immunological Reviews 216 1 pp 176 197 April 2007 doi 10 1111 j 1600 065X 2007 00499 x D E Kirschner G F Webb A Mathematical Model of Combined Drug Therapy of HIV Infection Journal of Theoretical Medicine 1 1 pp 25 34 1997 doi 10 1080 10273669708833004 R J DeBoer P Hogeweg H F J Dullens Macrophage T Lymphocyte Interactions in the Anti Tumor Immune Response A Mathematical Model Journal of Immunology 134 1 pp 2748 2758 1985 S Bandini Hyper Cellular Automata for the Simulation of Complex Biological Systems a Model for the Immune System International Journal of Applied Science and Computation 3 pp 1 1996 N Fachada SimulIm an Application for the Modelling and Simulation of Complex Systems Using the Immune System as an Example Graduation project report Higher Technical Institute Technical University of Lisbon 2005 A Emerson E Rossi ImmunoGrid The Virtual Human Immune System Project Stud Health Technol Inform 126 pp 87 92 2007 C Bianca M Pennisi Immune system modelling by top down and bottom up approaches International Mathematical Forum 7 3 pp 109 128 2012 C M Ou Host based Intrusion Detection Dystems Adapted from Agent based Artificial Immune Systems Neurocomputing 88 pp 78 86 July 2012 doi 10 1016 j neucom 2011 07 031 R B Machado A Boukerche J B M Sobral K R L Juc a M S M A Notare A Hybrid Artificial Immune and

    Original URL path: http://www.ijorcs.org/manuscript/id/76/elnaz-b-noeparast-reza-ravanmehr/a-two-level-autonomous-intrusion-detection-model-inspired-by-the-immune-system (2016-05-01)
    Open archived version from archive

  • Optimized Method for Iranian Road Signs Detection and Recognition System
    Recognition Using Color Shape and Motion Information Proceedings of the 2005 IEEE Intelligent Vehicles Symposium Las Vegas USA June 6 8 2005 doi 10 1109 IVS 2005 1505111 M Benallal and J Meunier Real time color segmentation of road signs Electrical and Computer Engineering 2003 IEEE CCECE 2003 Canadian Conference on vol 3 pp 1823 1826 vol 3 May 2003 doi 10 1109 CCECE 2003 1226265 L Estevez and N Kehtarnavaz A real time histographic approach to road sign recognition Image Analysis and Interpretation 1996 Proceedings of the IEEE Southwest Symposium on pp 95 100 Apr 1996 doi 10 1109 IAI 1996 493734 S Varun S Singh R S Kunte R D S Samuel and B Philip A road traffic signal recognition system based on template matching employing tree classifier in ICCIMA 07 Proceedings of the International Conference on Computational Intelligence and Multimedia Applications ICCIMA 2007 Washington DC USA IEEE Computer Society 2007 pp 360 365 doi 10 1109 ICCIMA 2007 190 A Broggi P Cerri P Medici P Porta and G Ghisio Real time road signs recognition Intelligent Vehicles Symposium 2007 IEEE pp 981 986 June 2007 doi 10 1109 IVS 2007 4290244 A Ruta Y Li and X Liu Detection tracking and recognition of traffic signs from video input Oct 2008 pp 55 60 doi 10 1109 ITSC 2008 4732535 W J Kuo and C C Lin Two stage road sign detection and recognition Multimedia and Expo 2007 IEEE International Conference on pp 1427 1430 July 2007 doi 10 1109 ICME 2007 4284928 G Piccioli E D Micheli P Parodi and M Campani Robust method for road sign detection and recognition Image and Vision Computing vol 14 no 3 pp 209 223 1996 doi 10 1016 0262 8856 95 01057 2 P Pacl ık J Novoviˇcov a P Pudil and P Somol Road sign classification using laplace kernel classifier Pattern Recogn Lett vol 21 no 13 14 pp 1165 1173 2000 C Y Fang S W Chen and C S Fuh Road sign detection and tracking vol 52 no 5 pp 1329 1341 Sep 2003 A D L Escalera J M A Armingol and M Mata Traffic sign recognition and analysis for intelligent vehicles Image and Vision Computing vol 21 pp 247 258 2003 X Gao L Podladchikova D Shaposhnikov K Hong and N Shevtsova Recognition of traffic signs based on their colour and shape features extracted using human vision models Journal of Visual Communication and Image Representation vol 17 no 4 pp 675 685 2006 doi 10 1016 j jvcir 2005 10 003 G Loy Fast shape based road sign detection for a driver assistance system in In IEEE RSJ International Conference on Intelligent Robots and Systems IROS 2004 pp 70 75 doi 10 1109 IROS 2004 1389331 C Paulo and P Correia Automatic detection and classification of traffic signs in Image Analysis for Multimedia Interactive Services 2007 WIAMIS 07 Eighth International Workshop on June 2007 doi 10 1109 WIAMIS 2007 24 D Gavrila Traffic sign recognition

    Original URL path: http://www.ijorcs.org/manuscript/id/77/reza-azad-babak-azad-iman-tavakoli-kazerooni/optimized-method-for-iranian-road-signs-detection-and-recognition-system (2016-05-01)
    Open archived version from archive

  • Algebraic Fault Attack on the SHA-256 Compression Function
    Rounds of DES European Smart Card Security Conference eSmart 10 2010 pp 22 24 R Li C Li C Gong Differential fault analysis on SHACAL 1 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography FDTC 2009 pp 120 126 doi 10 1109 FDTC 2009 41 P Dusart G Letourneux O Vivolo Differential Fault Analysis on A E S 1st International Conference of Applied Cryptography and Network Security ACNS 03 Springer Berlin Heidelberg 2003 LNCS 2846 pp 293 306 doi 10 1007 978 3 540 45203 4 23 J Hoch and A Shamir Fault Analysis of Stream Ciphers 6th International Workshop on Cryptographic Hardware and Embedded Systems CHES 04 Springer Berlin Heidelberg 2004 LNCS 3156 pp 41 51 doi 10 1007 978 3 540 28632 5 18 E Biham L Granboulan P Q Nguyen Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4 12th International Workshop of Fast Software Encryption FSE 05 Springer Berlin Heidelberg 2005 LNCS 3557 pp 359 367 doi 10 1007 11502760 24 M Agoyan J M Dutertre D Naccache B Robisson A Tria When clocks fail On critical paths and clock faults the ninth Smart Card Research and Advanced Application IFIP Conference CARDIS 10 Springer Berlin Heidelberg 2010 LNCS 6035 pp 182 193 doi 10 1007 978 3 642 12510 2 13 H Bar El H Choukri D Naccache M Tunstall C Whelan The Sorcerer s Apprentice Guide to Fault Attacks Proceedings of the IEEE vol 94 issue 2 pp 370 382 doi 10 1109 JPROC 2005 862424 A Barenghi L Breveglieri I Koren D Naccache Fault injection attacks on cryptographic devices Theory practice and countermeasures Proceedings of the IEEE vol 100 issue 11 pp 3056 3076 doi 10 1109 JPROC 2012 2188769 O Dunkelman N Keller A Shamir ALRED blues New attacks on AES based MACs Cryptology ePrint Archive Report 2011 095 Online Available http eprint iacr org 2011 095 M Soos K Nohl C Castelluccia Extending SAT Solvers to Cryptographic Problems Twelfth International Conference on Theory and Applications of Satisfiability Testing SAT 09 Springer Berlin Heidelberg 2009 LNCS 5584 pp 244 257 doi 10 1007 978 3 642 02777 2 24 Y Sasaki Cryptanalyses on a Merkle Damgård Based MAC Almost Universal Forgery and Distinguishing H Attacks 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques EUROCRYPT 12 Springer Berlin Heidelberg 2012 LNCS 7237 pp 411 427 doi 10 1007 978 3 642 29011 4 25 J Kang K Jeong J Sung S Hong Differential Fault Analysis on HAS 160 Compression Function The 4th FTRA International Conference on Computer Science and its Applications CSA 12 Springer Berlin Heidelberg 2012 LNEE 203 PP 97 105 doi 10 1007 978 94 007 5699 1 11 L Wei T Zhi G Dawu W Yi L Zhiqiang L Ya Differential Fault Analysis on the MD5 Compression Function Journal of Computers 8 11 pp 2888 2894 Nov 2013 doi 10 4304 jcp 8 11 2888 2894 M Hojsik and B Rudolf Floating fault analysis

    Original URL path: http://www.ijorcs.org/manuscript/id/79/ronglin-hao-bao-li-bingke-ma-ling-song/algebraic-fault-attack-on-the-sha-256-compression-function (2016-05-01)
    Open archived version from archive

  • Real-Time Multiple License Plate Recognition System
    License plate automatic detection and recognition using level sets and neural networks 1st International Conference on Communications Signal Processing and their Applications IEEE 2013 pp 1 5 doi 10 1109 ICCSPA 2013 6487280 C N E Anagnostopoulos I E Anagnostopoulos I D Psoroulas V Loumos and E Kayafas License plate recognition from still images and video sequences A survey IEEE Trans Intell Transp Syst ol 9 no 3 2008 pp 377 391 doi 10 1109 TITS 2008 922938 R Azad B Azad and H R Shayegh Real Time and Efficient Method for Accuracy Enhancement of Edge Based License Plate Recognition System International Conference on Computer Information Technology and Digital Media 2013 pp 1 10 B Hongliang and L Changping A hybrid license plate extraction method based on edge statistics and morphology in Proc ICPR pp 831 834 2004 doi 10 1109 ICPR 2004 1334387 H J Lee S Y Chen and S Z Wang Extraction and recognition of license plates of motorcycles and vehicles on highways in Proc ICPR pp 356 359 2004 doi 10 1109 ICPR 2004 1333776 A Broumandnia and M Fathy Application of pattern recognition for Farsi license plate recognition presented at the ICGST Int Conf Graphics Vision and Image Processing GVIP Dec 2005 C T Hsieh Y S Juan and K M Hung Multiple license plate detection for complex background in Proc Int Conf AINA vol 2 pp 389 392 2005 doi 10 1109 AINA 2005 257 D S Kim and S I Chien Automatic car license plate extraction using modified generalized symmetry transform and image warping in Proc ISIE 2001 pp 2022 2027 doi 10 1109 ISIE 2001 932025 K Deb M K Hossen M I Khan and M R Alam Bangladeshi vehicle license plate detection method based on HSI color model and geometrical properties IEEE 7th International Forum Strategic Technology IFOST pp 1 5 2013 doi 10 1109 IFOST 2012 6357650 R Azad F Davami and B Azad novel and robust method for automatic license plate recognition system based on pattern recognition Advances in Computer Science an International Journal Vol 2 Issue 3 No 4 July 2013 pp 64 70 F Aghdasi and H Ndungo Automatic license plate recognition system in Proc AFRICON Conf Africa vol 1 2004 pp 45 50 doi 10 1109 AFRICON 2004 1406631 T Nukano M Fukumi and M Khalid Vehicle license plate character recognition by neural networks in Proc Int Symp Intell Signal Process Commun Syst 2004 pp 771 775 doi 10 1109 ISPACS 2004 1439164 R Juntanasub and N Sureerattanan A simple OCR method from strong perspective view in Proc Appl Imagery Pattern Recognit Workshop 2004 pp 235 240 doi 10 1109 AIPR 2004 8 K Kanayama Y Fujikawa K Fujimoto and M Horino Development of vehicle license number recognition system using real time image processing and its application to travel time measurement in Proc IEEE Veh Tech Conf May 1991 pp 798 804 doi 10 1109 VETEC 1991 140605 K Miyamoto K Nagano M Tamagawa I Fujita

    Original URL path: http://www.ijorcs.org/manuscript/id/80/babak-azad-eslam-ahmadzade/real-time-multiple-license-plate-recognition-system (2016-05-01)
    Open archived version from archive

  • FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
    doi 10 7815 ijorcs 42 2014 081 Close Abstract This Paper is a review study of FPGA implementation of Finite Impulse response FIR with low cost and high performance The key observation of this paper is an elaborate analysis about hardware implementations of FIR filters using different algorithm i e Distributed Arithmetic DA DA Offset Binary Coding DA OBC Common Sub expression Elimination CSE and sum of power of two SOPOT with less resources and without affecting the performance of the original FIR Filter References Cited By Steven W Smith The Scientist and Engineer s Guide to Digital Signal Processing California Technical Publishing San Diego California Second Edition 1999 Wang Wei Swamy M N S Ahmad M O Low power FIR filter FPGA implementation based on distributed arithmetic and residue number system Circuits and Systems 2001 MWSCAS 2001 Proceedings of the 44th IEEE 2001 Midwest Symposium on vol 1 no pp 102 105 vol 1 2001 doi 10 1109 MWSCAS 2001 986125 Saurabh Singh Rajput Dr S S Bhadauria Implementation of Fir Filter Using Efficient Window Function and Its Application in Filtering a Speech Signal International Journal of Electronics and Mechanical Controls Volume 1 Issue 1 November 2012 Sen M Kuo Bob H Lee and Wenshun Tian Real Time Digital Signal Processing Implementations and Applications John Wiley Sons Ltd England Second Edition 2006 Sonika Gupta Aman Panghal Performance Analysis of FIR Filter Design by Using Rectangular Hanning and Hamming Windows Method International Journal of Advanced Research in Computer Science and Software Engineering Volume 2 Issue 6 June 2012 Gao Jinding Hou Yubao Su Long Design and FPGA Implementation of Linear FIR Low pass Filter Based on Kaiser Window Function Intelligent Computation Technology and Automation ICICTA 2011 International Conference on vol 2 no pp 496 498 28 29 March 2011 doi 10 1109 ICICTA 2011 408 Croisier D J Esteban M E Levilion V Rizo Digital Filter for PCM Encoded Signals U S Patent No 3 777 130 1973 A Peled and B Liu A new hardware realization of digital filters IEEE Transactions on A S S P vol ASSP 22 pp 456 462 December 1974 Bo Hong Haibin Yin Xiumin Wang Ying Xiao Implementation of FIR filter on FPGA using DA OBC algorithm Information Science and Engineering ICISE 2010 2nd International Conference on vol no pp 3761 3764 4 6 Dec 2010 M Thenmozhi N Kirthika Analysis of Efficient Architectures for FIR filters using Common Subexpression Elimination Algorithm International Journal of Scientific Technology Research Volume 1 Issue 4 May 2012 Damian C Lunca E A low area FIR filter for FPGA implementation Telecommunications and Signal Processing TSP 2011 34th International Conference on vol no pp 521 524 18 20 Aug 2011 Heejong Yoo David V anderson Hardware efficient distributed arithmetic architecture for high order digital filters in proc IEEE International conference on Acoustics speech and signal processing ICASSP 05 Vol 5 pp 125 128 2005 Mahesh R Vinod A P A New Common Subexpression Elimination Algorithm for Realizing Low Complexity

    Original URL path: http://www.ijorcs.org/manuscript/id/81/jinalkumari-k-dhobi-dr-y-b-shukla-dr-kr-bhatt/fpga-implementation-of-fir-filter-using-various-algorithms-a-retrospective (2016-05-01)
    Open archived version from archive

  • Using Virtualization Technique to Increase Security and Reduce Energy Consumption in Cloud Computing
    42 2014 082 Close Abstract An approach has been presented in this paper in order to generate a secure environment on internet Based Virtual Computing platform and also to reduce energy consumption in green cloud computing The proposed approach constantly checks the accuracy of stored data by means of a central control service inside the network environment and also checks system security through isolating single virtual machines using a common virtual environment This approach has been simulated on two types of Virtual Machine Manager VMM Quick EMUlator Qemu HVM Hardware Virtual Machine Xen and outputs of the simulation in VMInsight show that when service is getting singly used the overhead of its performance will be increased As a secure system the proposed approach is able to recognize malicious behaviors and assure service security by means of operational integrity measurement Moreover the rate of system efficiency has been evaluated according to the amount of energy consumption on five applications Defragmentation Compression Linux Boot Decompression and Kernel Boot Therefore this has been resulted that to secure multi tenant environment managers and supervisors should independently install a security monitoring system for each Virtual Machines VMs which will come up to have the management heavy workload of While the proposed approach can respond to all VM s with just one virtual machine as a supervisor References Cited By Celesti Francesco A Villari M T and Puliafito A Improving Virtual Machine Migration in Federated Cloud Environments Second International Conference on Evolving Internet 20 25 September 2010 pp 61 67 doi 10 1109 INTERNET 2010 20 Chen Y Wo T and Li J An efficient resource management system for on line virtual cluster provision IEEE ICC 2009 pp 72 79 doi 10 1109 CLOUD 2009 64 Shwetha B and Balagoni Y Secure Data Storage In Cloud Computing International Journal of Research in Computer Science vol 1 2011 pp 63 73 doi 10 7815 ijorcs 11 2011 006 Mateescu G Gentzsch W and J Ribbens C Hybrid computingwhere HPC meets grid and cloud computing ELSEVIER FGCS 2011 pp 440 453 doi 10 1016 j future 2010 11 003 Zissis D and Lekkas D Addressing cloud computing security issues ELSEVIER FGCS 2011 pp 583 592 doi 10 1016 j future 2010 12 006 Li J Huai J Hu C and Zhu Y A Secure Collaboration Service for Dynamic Virtual Organizations IS Elsevier vol 180 issue 17 2010 pp 3086 3107 doi 10 1016 j ins 2010 05 014 Ray S and De Sarkar A Execution Analysis of Load Balancing Algorithms in Cloud Computing Environment IJCCSA Vol 2 No 5 2012 pp 1 13 Suakanto S H Supangkat S and Saragih R Performance Measurment of Cloud Computing Services IJCCSA Vol 2 No 2 2012 pp 9 20 M Azab A Ning P C Sezer E and Zhang X HIMA a hypervisor based integrity measurement agent IEEE Computer Society 2009 pp 461 470 doi 10 1109 ACSAC 2009 50 Zhao X Borders K and Prakash A Virtual machine security system

    Original URL path: http://www.ijorcs.org/manuscript/id/82/hamid-banirostam-alireza-hedayati-ahmad-khadem-zadeh/using-virtualization-technique-to-increase-security-and-reduce-energy-consumption (2016-05-01)
    Open archived version from archive



  •