A. Arcangeli, I. Eidus, and C. Wright, Increasing memory density by using kvm, Proceedings of the Linux Symposium, pp.19-28, 2009.

W. Dawoud, I. Takouna, and C. Meinel, Infrastructure as a service security: Challenges and solutions, Security, 2010.

S. Kent and K. Seo, Security Architecture for the Internet Protocol, RFC IETF, vol.4301, 2005.

Q. G. Miao, . Hui-liu, X. G. Zhang, Z. L. Liu, Y. Z. Yang et al., Yin-Cao: Developing a virtual network environment for analyzing malicious network behavior, 2010 International Conference on, pp.271-275, 2010.

A. Shah, Kernel-based virtualization with kvm. Linux Magazine 86, pp.37-39, 2008.

H. Wu, Y. Ding, C. Winer, and L. Yao, Network security for virtual machine in cloud computing, Computer Sciences and Convergence Information Technology (ICCIT) 5th International Conference on, pp.18-21, 2010.

C. Xianqin, W. Han, W. Sumei, and L. Xiang, Seamless virtual machine live migration on network security enhanced hypervisor, 2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology, pp.847-853, 2009.
DOI : 10.1109/ICBNMT.2009.5347800