1. Loganayagi, B., Sujatha, S.: Creating virtual platform for cloud computing. In: The Proceedings of IEEE International Conference on Computational Intelligence and Computing Research (ICCIC 2010), pp. 1–4, 28–29 Dec 2010
2. Sun, D., Chang, G., Guo, Q., Wang, C., Wang, X.: A dependability model to enhance security of cloud environment using system-level virtualization techniques. In: The Proceedings of First International Conference on Pervasive Computing, Signal Processing and Applications (PCSPA), pp. 305–310 (2010)
3. Princess, J.P., Paulraj, G.J.L., Jebadurai, I.J.: Methods to mitigate attacks during live migration of virtual machines—a survey. Int. J. Pure Appl. Math. 118(20), 3663–3670 (2018)
4. Rekha, G.S.: A study on virtualization and virtual machines. Int. J. Eng. Sci. Invention (IJESI). 7(5), 51–55 (2018)
5. Sahana, S., Bose, R., Sarddar, D.: An enhanced search optimization protocol based on gossip protocol for the cloud. Int. J. Appl. Eng. Res. 12(19), 8436–8442 (2017). ISSN 0973–4562