Secure Virtualization Technology, Farzad Sabahi
To come later
I use ProQuest for this one and used network security as the keyword for this one
Right now I am still debating whether or not it is an academic paper as one of the parts weren’t meet but by the looks of it they put that information at the end instead of beginning it also because of the length of the paper it only a couple of pages meaning it’s questionable to me.
It has 14 references in this paper.
Right now I’m still debating whether or not to use this as an article to use for assignment 2 as the length and other parts are not meet but personally, I haven’t reviewed and article before so this will be a first time.