1. J.Smith, R.Nair, “Virtual Machines: Versatile Platforms for Systems and Processes”,
2. K.Harrison, B.Bordbar, S.Ali, A.Norman, C.Dalton, “A framework for detecting malware in Cloud by identifying symptoms”, In C.H.Chi, D.Gašervic, W.-J.Van der Heuvel (eds.) 16th IEEE Int. Enterprise and Distributed Object Computing Conf., pp.164-172, 2012.
3. C.Dalton, D.Plaquin, W.Weidner, D.Kuhlmann, B.Balacheff, R.Brown,“Trusted virtual platforms: a key enabler for converged client devices”, SIGOPS Operating Systems Review, 43(1), pp. 36-43, 2009.
4. P.Willmann, S.Rixner, A.Cox, “Protection Strategies for Direct Access to VirtualisedVirtualised I/O Devices.”, ATC’08 USENIX pp.15-28, 2008.
5. White Paper: Intel Trusted Execution Technology:
http://www.intel.com/content/www/us/en/trusted-execution-technology/trusted-execution-technology-security-paper.html
(visited April 2014)