1. Ming Yu, Zhang Yu, Chang L, Dandan Z (2015) Virtual machine anomaly detection based on multiple attribute information entropy in cloud environment. J Huazhong University Sci Technol (Nat Sci) 05:63–67
2. Min W, Shengdong D (2012) Virtual machine anomaly monitoring based on Principal Component Analysis. Chongqing Univ Posts Telecommun (Nat Sci) 06:728–734
3. Tianshu W, Shuyu C, Hancui Z, Zhen Z (2016) Virtual machine anomaly detection algorithm based on detection domain division. Comput Appl 04:1066–1069
4. Guiping W (2005) Study on critical technologies regarding credible virtual machine anomaly detection in cloud environment. Chongqing University, Chongqing
5. Hui X (2014) Study on self-adaptive anomaly detection model and deployment strategy in cloud environment. Fudan University, Shanghai