[1] Shackleford, D. (2012). Virtualization security: protecting virtualized environments. John Wiley & Sons.
[2] Manikandasaran, S. S., Balaji, K., & Raja, S. (2018). Infrastructure virtualization security architecture specification for private cloud. International Journal of Computer Sciences and Engineering, 6(02), 10-14.
[3] Tsai, H. Y., Siebenhaar, M., Miede, A., Huang, Y., & Steinmetz, R. (2011). Threat as a service?: Virtualization's impact on cloud security. IT professional, 14(1), 32-37.
[4] Singh, A., & Chatterjee, K. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88-115.
[5] Mishra, A., Mathur, R., Jain, S., & Rathore, J. S. (2013). Cloud computing security. International Journal on Recent and Innovation Trends in Computing and Communication, 1(1), 36-39.
[6] Ibrahim, A. S., Hamlyn-Harris, J., & Grundy, J. (2016). Emerging security challenges of cloud virtual infrastructure. arXiv preprint arXiv:1612.09059.
[7] Alwakeel, A. M., Alnaim, A. K., & Fernandez, E. B. (2018, April). A survey of network function virtualization security. In SoutheastCon 2018 (pp. 1-8). IEEE.
[8] Zhang, N., Liu, D., & Zhang, Y. (2013, November). A research on cloud computing security. In 2013 International Conference on Information Technology and Applications (pp. 370-373). IEEE.
[9] Pan, W., Zhang, Y., Yu, M., & Jing, J. (2012). Improving virtualization security by splitting hypervisor into smaller components. In Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012. Proceedings 26 (pp. 298-313). Springer Berlin Heidelberg.
[10] Gurav, U., & Shaikh, R. (2010, February). Virtualization: a key feature of cloud computing. In Proceedings of the International Conference and Workshop on Emerging Trends in Technology (pp. 227-229).
[11] Kazim, M., Masood, R., Shibli, M. A., & Abbasi, A. G. (2013). Security aspects of virtualization in cloud computing. In Computer Information Systems and Industrial Management: 12th IFIP TC8 International Conference, CISIM 2013, Krakow, Poland, September 25-27, 2013. Proceedings (pp. 229-240). Springer Berlin Heidelberg.
[12] Chen, L., Xian, M., Liu, J., & Wang, H. (2020, April). Research on virtualization security in cloud computing. In IOP conference series: materials science and engineering (Vol. 806, No. 1, p. 012027). IOP Publishing.
[13] Luo, X., Yang, L., Ma, L., Chu, S., & Dai, H. (2011, November). Virtualization security risks and solutions of cloud computing via divide-conquer strategy. In 2011 Third International Conference on Multimedia Information Networking and Security (pp. 637-641). IEEE.
[14] AbdElRahem, O., Bahaa-Eldin, A. M., & Taha, A. (2016, December). Virtualization security: A survey. In 2016 11th International Conference on Computer Engineering & Systems (ICCES) (pp. 32-40). IEEE.
Luo, S., Lin, Z., Chen, X., Yang, Z., & Chen, J. (2011, December). Virtualization security for cloud computing service. In 2011 International Conference on Cloud and Service Computing (pp. 174-179). IEEE