Research Article

[Retracted] Design and Implementation of Cloud Computing Network Security Virtual Computing and Defense Technology

Figure 3

Trusted report generation time of DIMA for measurement content of different sizes.