Algorithms to isolation of logical and physical objects from malicious software | IEEE Conference Publication | IEEE Xplore