Research Article

Secure Virtualization Environment Based on Advanced Memory Introspection

Figure 12

Detection time for different numbers of VMs.