1. Statista (2016) Global public cloud infrastructure hardware/software spending 2015-2026, by segment (fee based). Online at http://www.statista.com/statistics/507952/worldwide-public-cloud-infrastructure-hardware-and-software-spending-by-segment/. Accessed 1 Dec 2017.
2. AV-Test Institute (2016) Statistics – new malware. Online at https://www.av-test.org/en/statistics/malware/. Accessed 1 Dec 2017.
3. Hashizume K, Rosado DG, Fernández-Medina E, Fernandez EB (2013) An analysis of security issues for cloud computing. J Internet Serv Appl 4(1):1–13.
4. Garfinkel T, Rosenblum M (2003) A Virtual Machine Introspection Based Architecture for Intrusion Detection In: Proceedings Network and Distributed Systems Security Symposium, 191–206.. The Internet Society, Reston.
5. Taubmann B, Rakotondravony N, Reiser HP (2016) Cloudphylactor: Harnessing mandatory access control for virtual machine introspection in cloud data centers In: International Conference on Trust, Security and Privacy in Computing and Communications, 2016. 15th Annual.. IEEE Computer Security, Los Alamitos.