期刊文献+
共找到92,907篇文章
< 1 2 250 >
每页显示 20 50 100
Virtual Synchronous Generator Control Strategy Based on Parameter Self-Tuning
1
作者 Jin Lin BinYu +3 位作者 Chao Chen Jiezhen Cai Yifan Wu Cunping Wang 《Energy Engineering》 2026年第1期181-203,共23页
With the increasing integration of renewable energy,microgrids are increasingly facing stability challenges,primarily due to the lack of inherent inertia in inverter-dominated systems,which is traditionally provided b... With the increasing integration of renewable energy,microgrids are increasingly facing stability challenges,primarily due to the lack of inherent inertia in inverter-dominated systems,which is traditionally provided by synchronous generators.To address this critical issue,Virtual Synchronous Generator(VSG)technology has emerged as a highly promising solution by emulating the inertia and damping characteristics of conventional synchronous generators.To enhance the operational efficiency of virtual synchronous generators(VSGs),this study employs smallsignal modeling analysis,root locus methods,and synchronous generator power-angle characteristic analysis to comprehensively evaluate how virtual inertia and damping coefficients affect frequency stability and power output during transient processes.Based on these analyses,an adaptive control strategy is proposed:increasing the virtual inertia when the rotor angular velocity undergoes rapid changes,while strengthening the damping coefficient when the speed deviation exceeds a certain threshold to suppress angular velocity oscillations.To validate the effectiveness of the proposed method,a grid-connected VSG simulation platform was developed inMATLAB/Simulink.Comparative simulations demonstrate that the proposed adaptive control strategy outperforms conventional VSGmethods by significantly reducing grid frequency deviations and shortening active power response time during active power command changes and load disturbances.This approach enhances microgrid stability and dynamic performance,confirming its viability for renewable-dominant power systems.Future work should focus on experimental validation and real-world parameter optimization,while further exploring the strategy’s effectiveness in improvingVSG low-voltage ride-through(LVRT)capability and power-sharing applications in multi-parallel configurations. 展开更多
关键词 New power system grid-connected inverter virtual synchronous generator(VSG) virtual inertia damping coefficient adaptive control
在线阅读 下载PDF
Advances in the application of virtual reality technology in ophthalmic surgical skills training
2
作者 Jia-Wen Wei Qing Zhang +4 位作者 Xiao-Yan Wang Ming-Xue Huang Jin-Hua Gan Wei-Hua Yang Wei Chi 《International Journal of Ophthalmology(English edition)》 2026年第2期393-404,共12页
Conventional surgical teaching techniques face several challenges,highlighting a necessity for ongoing innovation in ophthalmology education to align with the evolving demands of clinical practice.The recent rapid adv... Conventional surgical teaching techniques face several challenges,highlighting a necessity for ongoing innovation in ophthalmology education to align with the evolving demands of clinical practice.The recent rapid advancement of computer technology has enabled the integration of virtual reality(VR)into medical training,thereby revolutionizing ophthalmic surgical education through VRbased educational methods.VR technology offers a safe,risk-free environment for trainees to practice repeatedly,enhancing surgical skills and accelerating the learning curve without compromising patient safety.This research outlines the application of VR technology in ophthalmic surgical skills training,particularly in cataract and vitreoretinal surgery.Including assessing the effectiveness of intraocular surgery training systems,evaluating skills transfer to the operating room,comparing it with wet lab cataract surgery training,and enhancing non-dominant hand training for cataract surgery,among other aspects.Additionally,this paper will identify the limitations of VR technology in ocular surgical skills training,offer improvement strategies,and detail the advantages and prospects,with the objective of guiding subsequent researchers. 展开更多
关键词 virtual reality OPHTHALMOLOGY ophthalmic surgical skills training surgical simulation cataract surgery vitreoretinal surgery
原文传递
Optimal Operation of Virtual Power Plants Based on Revenue Distribution and Risk Contribution
3
作者 Heping Qi Wenyao Sun +2 位作者 Yi Zhao Xiaoyi Qian Xingyu Jiang 《Energy Engineering》 2026年第1期373-392,共20页
Virtual power plant(VPP)integrates a variety of distributed renewable energy and energy storage to participate in electricity market transactions,promote the consumption of renewable energy,and improve economic effici... Virtual power plant(VPP)integrates a variety of distributed renewable energy and energy storage to participate in electricity market transactions,promote the consumption of renewable energy,and improve economic efficiency.In this paper,aiming at the uncertainty of distributed wind power and photovoltaic output,considering the coupling relationship between power,carbon trading,and green cardmarket,the optimal operationmodel and bidding scheme of VPP in spot market,carbon trading market,and green card market are established.On this basis,through the Shapley value and independent risk contribution theory in cooperative game theory,the quantitative analysis of the total income and risk contribution of various distributed resources in the virtual power plant is realized.Moreover,the scheduling strategies of virtual power plants under different risk preferences are systematically compared,and the feasibility and accuracy of the combination of Shapley value and independent risk contribution theory in ensuring fair income distribution and reasonable risk assessment are emphasized.A comprehensive solution for virtual power plants in the multi-market environment is constructed,which integrates operation strategy,income distribution mechanism,and risk control system into a unified analysis framework.Through the simulation of multi-scenario examples,the CPLEXsolver inMATLAB software is used to optimize themodel.The proposed joint optimization scheme can increase the profit of VPP participating in carbon trading and green certificate market by 29%.The total revenue of distributed resources managed by VPP is 9%higher than that of individual participation. 展开更多
关键词 virtual power plant carbon trading green certificate trading CVAR shapley risk contribution optimal scheduling
在线阅读 下载PDF
Optimal Dispatch of Urban Distribution Networks Considering Virtual Power Plant Coordination under Extreme Scenarios
4
作者 Yong Li Yuxuan Chen +4 位作者 Jiahui He Guowei He Chenxi Dai Jingjing Tong Wenting Lei 《Energy Engineering》 2026年第1期204-220,共17页
Ensuring reliable power supply in urban distribution networks is a complex and critical task.To address the increased demand during extreme scenarios,this paper proposes an optimal dispatch strategy that considers the... Ensuring reliable power supply in urban distribution networks is a complex and critical task.To address the increased demand during extreme scenarios,this paper proposes an optimal dispatch strategy that considers the coordination with virtual power plants(VPPs).The proposed strategy improves systemflexibility and responsiveness by optimizing the power adjustment of flexible resources.In the proposed strategy,theGaussian Process Regression(GPR)is firstly employed to determine the adjustable range of aggregated power within the VPP,facilitating an assessment of its potential contribution to power supply support.Then,an optimal dispatch model based on a leader-follower game is developed to maximize the benefits of the VPP and flexible resources while guaranteeing the power balance at the same time.To solve the proposed optimal dispatch model efficiently,the constraints of the problem are reformulated and resolved using the Karush-Kuhn-Tucker(KKT)optimality conditions and linear programming duality theorem.The effectiveness of the strategy is illustrated through a detailed case study. 展开更多
关键词 Urban distribution network virtual power plant power supply support leader-follower optimization game extreme weather scenarios
在线阅读 下载PDF
Virtually Baer模
5
作者 王永铎 陈玉华 《兰州理工大学学报》 北大核心 2025年第1期145-149,共5页
引入virtually Baer模的概念,举例说明virtually Baer模是Baer模的真推广,给出了在一定条件下virtually Baer模对直和项的封闭性,讨论了virtually Baer模与GSIP模、广义SSIP模之间的关系,由此给出了半单artinian环及右V-环新的刻画.
关键词 virtually Baer模 Baer模 GSIP模 半单artinian环 V-环
在线阅读 下载PDF
Service-Oriented Network Virtualization Architecture for Internet of Things 被引量:4
6
作者 Yongan Guo Hongbo Zhu Longxiang Yang 《China Communications》 SCIE CSCD 2016年第9期163-172,共10页
As a key technology to realize smart services of Internet of Things(Io T),network virtualization technology can support the network diversification and ubiquity,and improve the utilization rate of network resources.Th... As a key technology to realize smart services of Internet of Things(Io T),network virtualization technology can support the network diversification and ubiquity,and improve the utilization rate of network resources.This paper studies the service-oriented network virtualization architecture for Io T services.Firstly the semantic description method for Io T services is proposed,then the resource representation model and resource management model in the environment of network virtualization are presented.Based on the above models,the service-oriented virtual network architecture for Io T is established.Finally,a smart campus system is designed and deployed based on the service-oriented virtual network architecture.Moreover,the proposed architecture and models are verified in experiments. 展开更多
关键词 Internet of Things network virtualization virtual network resource management virtual network embedding
在线阅读 下载PDF
ApplianceBricks: A Scalable Network Appliance Architecture for Network Functions Virtualization 被引量:2
7
作者 MA Shicong WANG Baosheng +1 位作者 ZHANG Xiaozhe GAO Xianming 《China Communications》 SCIE CSCD 2016年第S1期32-42,共11页
Network Functions Virtualization(NFV) is an attempt to help operators more effectively manage their networks by implementing traditional network functions embedded in specialized hardware platforms in term of virtuali... Network Functions Virtualization(NFV) is an attempt to help operators more effectively manage their networks by implementing traditional network functions embedded in specialized hardware platforms in term of virtualized software instances. But, existing novel network appliances designed for NFV infrastructure are always architected on a general-purpose x86 server, which makes the performance of network functions limited by the hosted single server. To address this challenge, we propose ApplianceB ricks, a novel NFV-enable network appliance architecture that is used to explore the way of consolidating multiple physical network functions into a clustered network appliance, which is able to improve the processing capability of NFV-enabled network appliances. 展开更多
关键词 NFV network APPLIANCE virtualization software ROUTERS cluster-based appliances CONSOLIDATION SCALABILITY
在线阅读 下载PDF
A Trusted Mobile Payment Environment Based on Trusted Computing and Virtualization Technology 被引量:2
8
作者 WANG Juan LIN Wutao +3 位作者 LI Haoyu DU Bianxia MENG Ke WANG Jiang 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期379-384,共6页
In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store t... In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store the image of TOS in a memory card to hinder tampering. The integrity of TOS is protected by means of a trusted platform module (TPM). TOS can only be updated through a trusted third party. In addition, virtualization technology is applied to isolate TOS from normal OS. Users complete ordinary affairs in normal OS and security-sensitive affairs in TOS. TMPE can offer users a highly protected environment for mobile payment. Moreover, TMPE has good compatibility in different hardware architectures of mobile platforms. As the evaluation shows, TMPE satisfies the requirement of mobile payment well. 展开更多
关键词 trusted computing mobile payment virtualization mobile platform
原文传递
Virtualization Technology in Cloud Computing Based Radio Access Networks:A Primer 被引量:2
9
作者 ZHANG Xian PENG Mugen 《ZTE Communications》 2017年第4期47-66,共20页
Since virtualization technology enables the abstraction and sharing of resources in a flexible management way, the overall expenses of network deployment can be significantly reduced. Therefore, the technology has bee... Since virtualization technology enables the abstraction and sharing of resources in a flexible management way, the overall expenses of network deployment can be significantly reduced. Therefore, the technology has been widely applied in the core network. With the tremendous growth in mobile traffic and services, it is natural to extend virtualization technology to the cloud computing based radio access networks(CCRANs) for achieving high spectral efficiency with low cost.In this paper, the virtualization technologies in CC-RANs are surveyed, including the system architecture, key enabling techniques, challenges, and open issues. The enabling key technologies for virtualization in CC-RANs mainly including virtual resource allocation, radio access network(RAN) slicing, mobility management, and social-awareness have been comprehensively surveyed to satisfy the isolation, customization and high-efficiency utilization of radio resources. The challenges and open issues mainly focus on virtualization levels for CC-RANs, signaling design for CC-RAN virtualization, performance analysis for CC-RAN virtualization, and network security for virtualized CC-RANs. 展开更多
关键词 network virtualization CC-RAN RAN SLICING FOG computing
在线阅读 下载PDF
Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment 被引量:1
10
作者 Gabriel Cephas Obasuyi Arif Sari 《International Journal of Communications, Network and System Sciences》 2015年第7期260-273,共14页
The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of informati... The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of information technology infrastructure creates the enablement of IT resources to be shared and used on several other devices and applications;this increases the growth of business needs. The environment created by virtualization is not restricted to any configuration physically or execution. The resources of a computer are shared logically. Hypervisors help in virtualization of hardware that is a software interact with the physical system, enabling or providing virtualized hardware environment to support multiple running operating system simultaneously utilizing one physical server. This paper explores the benefits, types and security issues of Virtualization Hypervisor in virtualized hardware environment. 展开更多
关键词 virtualization Hypervisors virtual MACHINE virtual MACHINE MONITOR SECURITY
在线阅读 下载PDF
Network Virtualization Based Seamless Networking Scheme for Fiber-Wireless(FiWi)Networks 被引量:3
11
作者 DAI Qinglong ZOU Jianfeng +2 位作者 SHOU Guochu HU Yihong GUO Zhigang 《China Communications》 SCIE CSCD 2014年第5期1-16,共16页
In order to reduce cost and complexity,fiber-wireless(FiWi)networks emerge,combining the huge amount of available bandwidth of fiber networks and the flexibility,mobility of wireless networks.However,there is still a ... In order to reduce cost and complexity,fiber-wireless(FiWi)networks emerge,combining the huge amount of available bandwidth of fiber networks and the flexibility,mobility of wireless networks.However,there is still a long way to go before taking fiber and wireless systems as fully integrated networks.In this paper,we propose a network visualization based seamless networking scheme for FiWi networks,including hierarchical model,service model,service implementation and dynamic bandwidth assignment(DBA).Then,we evaluate the performance changes after network virtualization is introduced.Throughput for nodes,bandwidth for links and overheads leaded by network virtualization are analyzed.The performance of our proposed networking scheme is evaluated by simulation and real implementations,respectively.The results show that,compared to traditional networking scheme,our scheme has a better performance. 展开更多
关键词 fiber-wireless networks network virtualization SERVICE future network
在线阅读 下载PDF
Content Addressable Storage Optimization for Desktop Virtualization Based Disaster Backup Storage System 被引量:3
12
作者 Ruan Li Xiao Lim in Zhu Mingfa 《China Communications》 SCIE CSCD 2012年第7期1-13,共13页
This paper proposes a content addres sable storage optimization method, VDeskCAS, for desktop virtualization storage based disaster backup storage system. The method implements a blocklevel storage optimization, by em... This paper proposes a content addres sable storage optimization method, VDeskCAS, for desktop virtualization storage based disaster backup storage system. The method implements a blocklevel storage optimization, by employing the algorithms of chunking image file into blocks, the blockffmger calculation and the block dedup li cation. A File system in Use Space (FUSE) based storage process for VDeskCAS is also introduced which optimizes current direct storage to suit our content addressable storage. An interface level modification makes our system easy to extend. Experiments on virtual desktop image files and normal files verify the effectiveness of our method and above 60% storage volume decrease is a chieved for Red Hat Enterprise Linux image files. Key words: disaster backup; desktop virtualization; storage optimization; content addressable storage 展开更多
关键词 disaster backup desktop virtualization storage optimization content addressable storage
在线阅读 下载PDF
A highly reliable embedding algorithm for airborne tactical network virtualization 被引量:2
13
作者 MIAO Jingcheng LYU Na +2 位作者 CHEN Kefan CHEN Zhuo GAO Weiting 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2021年第6期1364-1374,共11页
The evolution of airborne tactical networks(ATNs)is impeded by the network ossification problem.As a solution,network virtualization(NV)can provide a flexible and scalable architecture where virtual network embedding(... The evolution of airborne tactical networks(ATNs)is impeded by the network ossification problem.As a solution,network virtualization(NV)can provide a flexible and scalable architecture where virtual network embedding(VNE)is a key part.However,existing VNE algorithms cannot be optimally adopted in the virtualization of ATN due to the complex interference in aircombat field.In this context,a highly reliable VNE algorithm based on the transmission rate for ATN virtualization(TR-ATVNE)is proposed to adapt well to the specific electromagnetic environment of ATN.Our algorithm coordinates node and link mapping.In the node mapping,transmission-rate resource is firstly defined to effectively evaluate the ranking value of substrate nodes under the interference of both environmental noises and enemy attacks.Meanwhile,a feasible splitting rule is proposed for path splitting in the link mapping,considering the interference between wireless links.Simulation results reveal that our algorithm is able to improve the acceptance ratio of virtual network requests while maintaining a high revenue-to-cost ratio under the complex electromagnetic interference. 展开更多
关键词 airborne tactical network(ATN) network virtualization(NV) resource allocation virtual network embedding(VNE) transmission rate
在线阅读 下载PDF
TPM Context Manager and Dynamic Configuration Management for Trusted Virtualization Platform 被引量:1
14
作者 QIN Yu FENG Dengguo LIU Chunyong 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期539-546,共8页
It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen who... It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen whose system configuration changes easily. TPM (trusted platform module) context manager is presented to carry out dynamic configuration management for virtual machine. It manages the TPM command requests and VM (virtual machine) configurations. The dynamic configuration representa- tion method based on Merkle hash tree is explicitly proposed against TCG (trusted computing group) static configuration representation. It reflects the true VM status in real time even if the configuration has changed, and it eliminates the invalidation of configuration representation, sealing storage and remote attestation. TPM context manager supports TCG storage protection, remote attestation etc, which greatly enhances the security on trusted virtualization platform. 展开更多
关键词 trusted computing TPM (trusted platform module) trusted virtualization configuration representation configuration management
在线阅读 下载PDF
A Review in the Core Technologies of 5G: Device-to-Device Communication, Multi-Access Edge Computing and Network Function Virtualization 被引量:2
15
作者 Ruixuan Tu Ruxun Xiang +1 位作者 Yang Xu Yihan Mei 《International Journal of Communications, Network and System Sciences》 2019年第9期125-150,共26页
5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and ... 5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances. 展开更多
关键词 5th Generation Network virtualization Device-To-Device COMMUNICATION Base STATION Direct COMMUNICATION INTERFERENCE Multi-Access EDGE COMPUTING Mobile EDGE COMPUTING
在线阅读 下载PDF
A State-of-the-Art Survey on Real-Time Issues in Embedded Systems Virtualization 被引量:1
16
作者 Zonghua Gu Qingling Zhao 《Journal of Software Engineering and Applications》 2012年第4期277-290,共14页
Virtualization has gained great acceptance in the server and cloud computing arena. In recent years, it has also been widely applied to real-time embedded systems with stringent timing constraints. We present a compre... Virtualization has gained great acceptance in the server and cloud computing arena. In recent years, it has also been widely applied to real-time embedded systems with stringent timing constraints. We present a comprehensive survey on real-time issues in virtualization for embedded systems, covering popular virtualization systems including KVM, Xen, L4 and others. 展开更多
关键词 virtualization EMBEDDED Systems REAL-TIME Scheduling
在线阅读 下载PDF
Multiple attacks on virtualization-based security monitoring
17
作者 闫广禄 罗森林 +1 位作者 韦伟 潘丽敏 《Journal of Beijing Institute of Technology》 EI CAS 2016年第2期254-263,共10页
Three kinds of vulnerabilities that may exist in some of current virtualization-based security monitoring systems were proposed: page mapping problem,lack of overall protection,and inherent limitations. Aiming at the... Three kinds of vulnerabilities that may exist in some of current virtualization-based security monitoring systems were proposed: page mapping problem,lack of overall protection,and inherent limitations. Aiming at these vulnerabilities,relative attack methods were presented in detail. Our experiments show that the attack methods,such as page mapping attack,data attack,and non-behavior detection attack,can attack simulated or original security monitors successfully. Defenders,who need to effectively strengthen their security monitors,can get an inspiration from these attack methods and find some appropriate solutions. 展开更多
关键词 virtualization VULNERABILITY attack method security threat virtual machine monitor
在线阅读 下载PDF
Resource Virtualization Model Using Hybrid-graph Representation and Converging Algorithm for Cloud Computing
18
作者 Quan Liang Yuan-Zhuo Wang Yong-Hui Zhang 《International Journal of Automation and computing》 EI CSCD 2013年第6期597-606,共10页
Cloud computing can provide a great capacity for massive computing, storage as well as processing. The capacity comes from the cloud computing system itself, which can be likened to a virtualized resource pool that su... Cloud computing can provide a great capacity for massive computing, storage as well as processing. The capacity comes from the cloud computing system itself, which can be likened to a virtualized resource pool that supports virtualization applications as well as load migration. Based on the existing technologies, the paper proposes a resource virtualization model (RVM) utilizing a hybrid-graph structure. The hybrid-graph structure can formally represent the critical entities such as private clouds, nodes within the private clouds, and resource including its type and quantity. It also provides a clear description of the logical relationship and the dynamic expansion among them as well. Moreover, based on the RVM, a resource converging algorithm and a maintaining algorithm of the resource pool which can timely reflect the dynamic variation of the private cloud and resource are presented. The algorithms collect resources and put them into the private cloud resource pools and global resource pools, and enable a real-time maintenance for the dynamic variation of resource to ensure the continuity and reliability. Both of the algorithms use a queue structure to accomplish functions of resource converging. Finally, a simulation platform of cloud computing is designed to test the algorithms proposed in the paper. The results show the correctness and the reliability of the algorithms. 展开更多
关键词 Cloud computing resource virtualization hybrid graph resource converging simulation.
原文传递
Enhancing the Performance of Current Online Education System—A Study of Cloud Computing and Virtualization
19
作者 Basheer Riskhan Raza Muhammed 《Journal of Computer and Communications》 2015年第10期43-51,共9页
Online Education (OE) system is an effective and efficient way to perform the education in all sectors of government and non-government educational organization. Low performance and minimum speed are major overhead in... Online Education (OE) system is an effective and efficient way to perform the education in all sectors of government and non-government educational organization. Low performance and minimum speed are major overhead in the current ongoing OE system due to the increase of users and some system issues. Base on the previous study and recent practical issues, a model is proposed to Enhancing the Performance of Online Education System (EPOES) to examine the bare metal virtualization, isolation and virtual machine templates. Bare metal virtualization has led the native execution, isolation isolated the running application and Virtual Machine Template has help to increase efficiency, avoiding the repetitive installation and operate the server in less time. The proposed model boosts the performance of the current OE system, and examines the benefits of the adaptation of cloud computing and virtualization which can be used to overcome the existing challenges and barriers of the current OE System. 展开更多
关键词 BARE Metal virtualization CLOUD Computing ISOLATION virtual Machine TEMPLATE
在线阅读 下载PDF
Virtualization Security, Strategy and Management
20
作者 Simon Tran Stuart Gold 《International Journal of Communications, Network and System Sciences》 2014年第10期423-429,共7页
The purpose of this quantitative study was to determine the relationship between the security management framework of organizations and the security condition of the virtualized environment.
关键词 virtualization Technology virtual MACHINE SECURITY ISSUES SECURITY MANAGEMENT Framework
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部