{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T08:35:38Z","timestamp":1725438938079},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/ccis.2012.6664445","type":"proceedings-article","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T16:48:02Z","timestamp":1385570882000},"page":"444-448","source":"Crossref","is-referenced-by-count":0,"title":["An architecture for dynamic management and monitoring of virtual machines"],"prefix":"10.1109","author":[{"given":"Wei","family":"Chen","sequence":"first","affiliation":[]},{"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/800122.803961"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130776"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1064979.1065006"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.2001.990073"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655022"},{"key":"12","first-page":"1","article-title":"Antfarm: Tracking processes in a virtual machine environment","author":"jones","year":"2006","journal-title":"Proceedings of the Annual Conference on USENIX '06 Annual Technical Conference"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"2","article-title":"A virtual machine introspection based architecture for intrusion detection","author":"garfinkel","year":"2003","journal-title":"Network and Distributed Systems"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.13"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346278"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.10"},{"key":"6","article-title":"Shype: Secure hypervisor approch to trusted virtualied system","author":"sailer","year":"2005","journal-title":"Computer Sience"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/945461.945462"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CMPCON.1979.729112"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1655148.1655150"}],"event":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems (CCIS)","start":{"date-parts":[[2012,10,30]]},"location":"Hangzhou, China","end":{"date-parts":[[2012,11,1]]}},"container-title":["2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6637132\/6664354\/06664445.pdf?arnumber=6664445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T22:51:35Z","timestamp":1490223095000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6664445\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ccis.2012.6664445","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}