Evaluating the POWER8 architecture through optimizing stencil-based algorithmsJingheng XuHaohuan Fuet al.2016TrustCom/BigDataSE/ISPA 2016
Whispers between the containers: High-capacity covert channel attacks in DockerYang LuoWu Luoet al.2016TrustCom/BigDataSE/ISPA 2016