S. Bleikertz, T. Groß, M. Schunter, and K. Eriksson, Automated Information Flow Analysis of Virtualized Infrastructures, Proceedings of the 16th European Conference on Research in Computer Security, pp.392-415, 2011.
DOI : 10.1007/978-3-642-23822-2_22

S. Bleikertz, C. Vogel, and T. Gross, Cloud radar, Proceedings of the 30th Annual Computer Security Applications Conference on, ACSAC '14, 2014.
DOI : 10.1145/2664243.2664274

T. Madi, S. Majumdar, Y. Wang, M. Pourzandi, and L. Wang, Auditing security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack, 6th ACM Conference on Data and Application Security and Privacy ACM CODASPY 2016, 2016.

P. Mell and T. Grance, The NIST Definition of Cloud Computing, 2011.
DOI : 10.6028/NIST.SP.800-145

S. Noel, S. Jajodia, and A. Singhal, Measuring security risk of networks using attack graphs, International Journal of Next- Generation Computing, vol.1, issue.1, 2010.

J. Oberheide, E. Cooke, and F. Jahanian, Empirical exploitation of live virtual machine migration, BlackHat DC convention, 2008.

X. Ou and A. Singhal, Quantitative Security Risk Assessment of Enterprise Networks, 2012.
DOI : 10.1007/978-1-4614-1860-3

L. Samarji, N. Cuppens-boulahia, F. Cuppens, W. Kanoun, S. Papillon et al., Liccas: Assessing the likelihood of individual, coordinated, and concurrent attack scenarios, 10th International Conference on Security and Privacy in Communication Networks, p.2014, 2014.