Y. Hori, W. Claycomb, and K. Yim, Guest Editorial, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2012.
DOI : 10.1007/s10570-006-9067-y

M. Shuyuan, H. Ho, and . Lee, A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2012.

P. England and J. Manferdelli, Virtual machines for enterprise desktop security, Information Security Technical Report, vol.11, issue.4, pp.193-202, 2006.
DOI : 10.1016/j.istr.2006.09.001

G. Popek and R. Goldberg, Formal Requirements for Virtualizable 3rd Generation Architectures, Communications of the A.C.M, vol.17, issue.7, pp.412-421, 1974.
DOI : 10.1145/361011.361073

R. , J. S. And-irvine, and C. , Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor, Proceedings of the 9th conference on USENIX Security Symposium(USENIX'00) USENIX Association, 2000.

M. Sutton, A. Greene, and P. Amini, Fuzzing: Brute Force Vulnerability Discovery, 2007.