1. [1] Henderson, A., Yin, H., Jin, G., Han, H. and Deng, H.: VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices, The 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017), Lecture Notes in Computer Science, Vol.10453, pp.3-25, Springer (2017).
2. [2] Oludele, A., Ogu, E.C., Shade, K. and Chinecherem, U.: On the Evolution of Virtualization and Cloud Computing: A Review, Journal of Computer Sciences and Applications, Vol.2, No.3, pp.40-43 (2015).
3. [3] Crane, C. and Nohe, P.: Re-Hash: The Largest DDoS Attacks in History (2020) (online), available from <https://www.thesslstore.com/blog/largest-ddos-attack-in-history>
4. [4] Graziano, C.D.: A performance analysis of Xen and KVM hypervisors for hosting the Xen Worlds Project, Master of Science thesis, Iowa State University (2011) (online), available from <http://lib.dr.iastate.edu/cgi/viewcontent.cgi?article=3243&context=etd.>
5. [5] Rossow, C.: Amplification Hell: Revisiting Network Protocols for DDoS Abuse, Symposium on Network and Distributed System Security (NDSS) (2014) (online), available from <https://christian-rossow.de/publications/amplification-ndss2014.pdf>