H Zhou,
H Ba, Y Wang, Z Wang, J Ma, Y Li, H Qiao - Symmetry, 2019 - mdpi.com
The dramatic proliferation of cloud computing makes it an attractive target for malicious
attacks. Increasing solutions resort to virtual machine introspection (VMI) to deal with …