1. Furht B, Chapter 1, Handbook of cloud computing
2. The NIST Definition of Cloud Computing, Recommendations of the National Institute of Standards and Technology, Special Publication 800-145 (Draft)
3. Guide to Intrusion Detection and Prevention Systems (IDPS), Recommendations of the National Institute of Standards and Technology, Special Publication 800-94
4. Garfinkel T, Rosenblum M (2003) A virtual machine introspection-based architecture for intrusion detection. In:Proceedings 10th symposium, Network and Distributed System Security (NDSS 03), Internet Society, pp 191–206
5. Zhou CV, Leckie C, Karunaseker S (2010) A survey of coordinated attacks and collaborative intrusion detection. Comput Secur 29(1):124–140