Securing Virtualization: Techniques and Applications.
| dc.contributor.advisor | Xuxian Jiang, Chair | en_US |
| dc.contributor.advisor | Douglas Reeves, Member | en_US |
| dc.contributor.advisor | Peng Ning, Member | en_US |
| dc.contributor.advisor | Huiyang Zhou, Member | en_US |
| dc.contributor.author | Wang, Zhi | en_US |
| dc.date.accepted | 2012-07-02 | en_US |
| dc.date.accessioned | 2012-07-04T05:30:30Z | |
| dc.date.available | 2012-07-04T05:30:30Z | |
| dc.date.defense | 2012-06-08 | en_US |
| dc.date.issued | 2012-06-08 | en_US |
| dc.date.released | 2012-07-04 | en_US |
| dc.date.reviewed | 2012-06-11 | en_US |
| dc.date.submitted | 2012-06-08 | en_US |
| dc.degree.discipline | Computer Science | en_US |
| dc.degree.level | dissertation | en_US |
| dc.degree.name | Doctor of Philosophy | en_US |
| dc.identifier.other | deg1844 | en_US |
| dc.identifier.uri | http://www.lib.ncsu.edu/resolver/1840.16/7854 | |
| dc.rights | en_US | |
| dc.title | Securing Virtualization: Techniques and Applications. | en_US |
Files
Original bundle
1 - 1 of 1
