1. Chen, P. M., & Noble, B. D. (2001). When virtual is better than real [operating system relocation to virtual machines. In Hot Topics in Operating Systems, 2001. Proceedings of the Eighth Workshop on, (pp. 133–138). IEEE.
2. Bao, Y., Zhang, J., Zhu, Y., Tang, D., Ruan, Y., Chen, M., et al. (2011). arXiv preprint arXiv:1106.2568 .
3. Garfinkel, T., & Rosenblum, M., et al. (2003). A virtual machine introspection based architecture for intrusion detection. In NDSS, Vol. 3, pp. 191–206.
4. Mankin, J., & Kaeli, D. (2012). Dione: A flexible disk monitoring and analysis framework. In Research in attacks, intrusions, and defenses (pp. 127–146). Springer.
5. Carbone, M. (2012). Semantic view re-creation for the secure monitoring of virtual machines. Georgia Institute of Technology.