{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:45:57Z","timestamp":1729669557351,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/icsmc.2009.5346051","type":"proceedings-article","created":{"date-parts":[[2009,12,10]],"date-time":"2009-12-10T14:44:31Z","timestamp":1260456271000},"page":"4858-4863","source":"Crossref","is-referenced-by-count":0,"title":["A low-cost Green IT concept design of VHSP based on virtualization technology"],"prefix":"10.1109","author":[{"given":"Chih-Hung","family":"Chang","sequence":"first","affiliation":[]},{"given":"Tzu-Chien","family":"Hsiao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"15"},{"key":"13","first-page":"1","author":"zanoramy ansiry","year":"2008","journal-title":"Deploying virtual honeypots on virtual machine monitor"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2005.163"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319169"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2008.10"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/945461.945462"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.163"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICSE.2008.81"},{"key":"10","first-page":"68","article-title":"Performance Evaluation of the CPU Scheduler in XEN","author":"xu","year":"2008","journal-title":"Proceedings of the IEEE ISISE International Symposium on Information Science and Engineering"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1281253"},{"key":"6","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1109\/AINA.2005.118","article-title":"Apply data mining todefense-in-depth network security system","volume":"1","author":"huang","year":"2005","journal-title":"Proceedings of the IEEE International Conference on Advanced Information Networking and Applications-AINA"},{"key":"5","first-page":"24","article-title":"Quantifying Performance Properties of Virtual Machine","author":"xu","year":"2008","journal-title":"Proceedings of the IEEE ISISE International Symposium on Information Science and Engineering"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193207"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICYCS.2008.218"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2008.24"}],"event":{"name":"2009 IEEE International Conference on Systems, Man and Cybernetics - SMC","start":{"date-parts":[[2009,10,11]]},"location":"San Antonio, TX, USA","end":{"date-parts":[[2009,10,14]]}},"container-title":["2009 IEEE International Conference on Systems, Man and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5340904\/5345886\/05346051.pdf?arnumber=5346051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T08:21:46Z","timestamp":1558686106000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5346051\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2009.5346051","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}