1. S. Alarifi and S. Wolthusen, Detecting anomalies in IaaS environments through virtual machine host system call analysis, Proceedings of the International Conference on Internet Technology and Secured Transactions, pp. 211–218, 2012.
2. R. Ando, Y. Kadobayashi and Y. Shinoda, Blink: Large-scale P2P network monitoring and visualization system using VM introspection, Proceedings of the Sixth International Conference on Networked Computing and Advanced Information Management, pp. 351–358, 2010.
3. S. Bahram, X. Jiang, Z. Wang, M. Grace, J. Li, D. Srinivasan, J. Rhee and D. Xu, DKSM: Subverting virtual machine introspection for fun and profit, Proceedings of the Twenty-Ninth IEEE Symposium on Reliable Distributed Systems, pp. 82–91, 2010.
4. F. Baiardi and D. Sgandurra, Building trustworthy intrusion detection through VM introspection, Proceedings of the Third International Symposium on Information Assurance and Security, pp. 209–214, 2007.
5. Z. Deng, D. Xu, X. Zhang and X. Jiang, IntroLib: Efficient and transparent library call introspection for malware forensics, Digital Investigation, vol. 9(S), pp. S13–S23, 2012.