Encrypted Virtual Machine Images for Confidential ComputingJames BottomleyBrijesh Singh2021KVM Forum 2021
Automating privacy compliance in the decentralized enterpriseGero DittmannChristopher Giblinet al.2022Big Data 2022
Graph Representation Learning based Vulnerable Target Identification in Ransomware AttacksWenqi WeiMu Qiaoet al.2022Big Data 2022