N. U. Shirazi, S. Simpson, A. K. Marnerides, M. Watson, A. Mauthe et al., Assessing the impact of intra-cloud live migration on anomaly detection, 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), 2014.
DOI : 10.1109/CloudNet.2014.6968968

A. Giannakou, L. Rillling, J. L. Pazat, F. Majorczyk, and C. Morin, Towards Self Adaptable Security Monitoring in IaaS Clouds, 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
DOI : 10.1109/CCGrid.2015.133

URL : https://hal.archives-ouvertes.fr/hal-01165134

T. Garfinkel and M. Rosenblum, A Virtual Machine Introspection Based Architecture for Intrusion Detection, Proc. NDSS, 2003.

A. Joshi, S. T. King, G. W. Dunlap, and P. M. Chen, Detecting Past and Present Intrusions Through Vulnerability-specific Predicates, Proc. SOSP, 2005.
DOI : 10.1145/1095809.1095820

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.81.29

K. Kourai, T. Azumi, and S. Chiba, A Self-Protection Mechanism against Stepping-Stone Attacks for IaaS Clouds, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012.
DOI : 10.1109/UIC-ATC.2012.139

S. Staniford-chen and L. T. Heberlein, Holding intruders accountable on the Internet, Proceedings 1995 IEEE Symposium on Security and Privacy, 1995.
DOI : 10.1109/SECPRI.1995.398921

O. S. Hofmann, A. M. Dunn, S. Kim, I. Roy, and E. Witchel, Ensuring Operating System Kernel Integrity with OSck, Proc. ASPLOS, 2011.

A. Seshadri, M. Luk, N. Qu, and A. Perrig, SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes, Proc. SOSP, 2007.