2016 journal article

A Study of security isolation techniques

ACM Computing Surveys, 49(3).

By: R. Shu, P. Wang, S. Gorski, B. Andow, A. Nadkarni, L. Deshotels, J. Gionta, W. Enck, X. Gu

Source: NC State University Libraries
Added: August 6, 2018