Research Article

Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

Figure 16

(a) and (b) A detailed view of the ROOT-6 volume.
(a)
(b)