1. Garfinkel T, Rosenblum M (2003) A virtual machine introspection based architecture for intrusion detection In: NDSS. The Internet Society, San Diego, California, ISBN 1-891562-15-0. ., [ http://www.isoc.org/isoc/conferences/ndss/03/proceedings/papers/13.pdf ] Garfinkel T, Rosenblum M (2003) A virtual machine introspection based architecture for intrusion detection In: NDSS. The Internet Society, San Diego, California, ISBN 1-891562-15-0. .
2. Chen PM, Noble BD: When virtual is better than real. In Hot Topics in Operating Systems, 2001. Proceedings of the Eighth Workshop on. IEEE Computer Society, Los Alamitos, CA; 2001:0133–0133. http://doi.ieeecomputersociety.org/10.1109/HOTOS.2001.990073 http://doi.ieeecomputersociety.org/10.1109/HOTOS.2001.990073 10.1109/HOTOS.2001.990073
3. Pfoh J, Schneider C, Eckert C: Nitro: hardware-based system call tracing for virtual machines. In Proceedings of the 6th International Conference on Advances in Information and Computer Security, IWSEC'11. Springer-Verlag, Berlin, Heidelberg; 2011:96–112. ISBN 978–3-642–25140–5 http://dl.acm.org/citation.cfm?id=2075658.2075669 ISBN 978-3-642-25140-5 http://dl.acm.org/citation.cfm?id=2075658.2075669 10.1007/978-3-642-25141-2_7
4. Carbone M, Conover M, Montague B, Lee W: Secure and robust monitoring of virtual machines through guest-assisted introspection. In Research in attacks, intrusions, and defenses. Lecture Notes in Computer Science. Edited by: Balzarotti D, Stolfo SJ, Cova M. Springer, Berlin Heidelberg; 2012:22–41. http://dx.doi.org/10.1007/978–3-642–33338–5_2 http://dx.doi.org/10.1007/978-3-642-33338-5_2 10.1007/978-3-642-33338-5_2
5. Butt S, Lagar-Cavilla HA, Srivastava A, Ganapathy V: Self-service cloud computing. Proceedings of the ACM Conference on Computer and Communications Security. Raleigh, North Carolina ACM, Raleigh, New York, NY; 2012, 253–264. [ http://doi.acm.org/10.1145/2382196.2382226 ] http://doi.acm.org/10.1145/2382196.2382226 http://doi.acm.org/10.1145/2382196.2382226