... Empirical Exploitation of live migration of virtual machines . Proc of Black Hat DC, March 24, 2008. [7] Xen users' manual Xen v3.3. http://bits.xensource.com/Xen/docs/user.pdf [8] Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer Rexford. ...
CITATION STYLE
Shetty, J., M R, A., & G, S. (2012). A Survey on Techniques of Secure Live Migration of Virtual Machine. International Journal of Computer Applications, 39(12), 34–39. https://doi.org/10.5120/4875-7305
Mendeley helps you to discover research relevant for your work.