Research Article

A Virtual Machine Migration Strategy Based on the Relevance of Services against Side-Channel Attacks

Figure 8

Experimental environment topology.