|
[1] CTFTIME.ORG. CTFtime.org/CTFs. https://ctftime.org/ ctfs.(2018.01.18) [2] Sudharsan Sundararajan, Hari N N, Vipin Pavithran, KaladharVorungati, Krishnashree Achuthan, "Preventing Insider Attacks in the Cloud," Advances in Computing and Communications, pp. 488-500, 2011. [3] Jayaraj Poroor, Bharat Jayaraman, "DoS Attacks on Real-Time Media Through Indirect Contention-in-Hosts," IEEE Internet Computing, Vol.13, No. 6, pp. 22-30, November/December, 2009. [4] Gregory Conti, Thomas Babbitt, and John Nelson, “HackingCompetitions and Their Untapped Potential for Security Education,” IEEE Security Privacy, Vol. 9, pp. 56-59, 2011. [5] 吳嘉龍,“美軍資訊戰與資安技術發展之研究”,陸軍學術雙月刊,第93-107頁,2009。 [6] H. Fayyad-Kazan, L. Perneel and M. Timerman, “Benchmarking the Performance of Microsoft Hyper-V Server, VMware ESXi, and Xen Hypervisors”, Journal of Emerging Trends in Computing and Information Sciences, Vol. 4, No. 12, pp. 922-933, 2013. [7] R. Morabito, J. Kjallman, M. Komu. , "Hypervisors vs. Lightweight Virtualization: A Performance Comparison," In Proceedings of IEEE International Conference on Cloud Engineering (IC2E), pp.386-393, 2015. [8] Anup Patel, Mai Daftedar, Mohmad Shalan and M. Watheq El-Kharashi, “Embedded hypervisor Xvisor: A Comparative Analysis”, In Proceedings of 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, pp. 682-691, 2015. [9] https://technet.microsoft.com/zh-tw/library/dd125460.aspx(2018.01.20) [10] Brenton J.W. Blawat, Mastering Windows PowerShell Scripting, Packt Publishing Ltd, pp.1-3, 2015.
|