Research Article

Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

Figure 4

Schematic diagram of the basic CloudStack based lab implementation.