[1]
J. Sun, H. Chen, C. Chang, and X. Li, “Kernel Code Integrity Protection Based on a Virtualized Memory Architecture”, Comput. Inform., vol. 32, no. 2, pp. 295–311, May 2013.