[1]
A. MIHALACHE, “The Analysis of the Virtual Machine Security”, IC3, vol. 3, pp. 43–52, Apr. 2016.