1. Heiser, G.: The role of virtualization in embedded systems. In: Proceedings of the 1st Workshop on Isolation and Integration in Embedded Systems, IIES 2008, pp. 11–16 (2008). https://doi.org/10.1145/1435458.1435461
2. Kasperksy Lab. Kaspersky DDoS Intelligence Report for Q2 2016 (2016). https://securelist.com/analysis/quarterly-malware-reports/75513/kaspersky-ddos-intelligence-report-for-q2-2016/
3. Shea, R., Liu, J.: Understanding the impact of denial of service attacks on virtual machines. In: 2012 IEEE 20th International Workshop on Quality of Service, pp. 1–9 (2012). https://doi.org/10.1109/iwqos.2012.6245975
4. Abramson, D., Jackson, J., Muthrasanallur, S., Neiger, G., Regnier, G., Sankaran, R., Schoinas, I., Uhlig, R., Vembu, B., Wiegert, J.: Intel virtualization technology for directed I/O. Intel Technol. J. 10(03), 16 (2006). https://doi.org/10.1535/itj.1003 . ISSN 1535-864X
5. Lowe, S., Natarajan, S., Unityvsa, E.M.C., Xenserver, C., Someswar, G.M., Kalaskar, H., Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Comparative analysis for new virtualization customers. Security 2(1), 369–381 (2016)