Cited By
View all- Kumar ASomani G(2024)Cyber Attack Victim Separation: New Dimensions to Minimize Attack Effects by Resource ManagementResource Management in Distributed Systems10.1007/978-981-97-2644-8_12(247-268)Online publication date: 31-May-2024
- Xu BLu M(2023)Agent-Based Virtual Machine Migration for Load Balancing and Co-Resident Attack in Cloud ComputingApplied Sciences10.3390/app1306370313:6(3703)Online publication date: 14-Mar-2023
- She JWang WWang Z(2023)The Dynamic Paradox: How Layer-skipping DNNs Amplify Cache Side-Channel Leakages2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom60117.2023.00029(46-53)Online publication date: 1-Nov-2023
- Show More Cited By