Effective way to defend the hypervisor attacks in cloud computing | IEEE Conference Publication | IEEE Xplore