1. Shroff A, Donthireddy VR—itlinfosys.com. Virtualization imperatives and performance. http://www.infosys.com/IT-services/application-services/white-papers/Documents/virtualization-imperatives-performance.pdf . Accessed 10 Feb 2013
2. Reuben JS (2007) A survey on virtual machine security, TKK T-110.5290 seminar on network. http://www.tml.tkk.fi/Publications/C/25/papers/Reuben_final.pdf . Accessed 10 Feb 2013
3. Rose R (2004) Survey of system virtualization techniques. http://citeseer.ist.psu.edu/720518.html . Accessed 10 Feb 2013
4. Garfinkel T, Rosenblum M (2003) A virtual machine introspection based architecture for intrusion detection. In: Proc. Net. and Distributed Sys. Sec. Symp., Feb 2003
5. Nellitheertha H—InfoSys.com (2006) Virtualization technologies, white paper. http://216.52.49.31/IT-services/infrastructure-services/white-papers/virtualization-technologies.pdf . Accessed 10 Feb 2013