[1]
S. N and U. A, “Security Vulnerabilities of Virtualization Technique”, IJET, vol. 7, no. 2.24, pp. 478–483, Apr. 2018, doi: 10.14419/ijet.v7i2.24.12140.