1. E. Brown, NIST issues cloud computing guidelines for managing security and privacy. National Institute of Standards and Technology, Special Publication (2012), pp. 144–800
2. T. Halabi, M. Bellaiche, Towards quantification and evaluation of security of cloud service providers. J. Inf. Secur. Appl. 33, 55–65 (2017)
3. S. Paquette, P.T. Jaeger, S.C. Wilson, Identifying the security risks associated with governmental use of cloud computing. Gov. Inf. Q. 27(3), 245–253 (2010)
4. K. Barr et al., The VMware mobile virtualization platform: is that a hypervisor in your pocket? ACM SIGOPS Oper. Syst. Rev. 44(4), 124–135 (2010)
5. J.C. Acosta, D.E. Krych, Hands-on cybersecurity studies: uncovering and decoding malware communications-initial analysis with Wireshark and volatility. US Army Combat Capabilities Development Command Army Research Laboratory Adelphi (2021)