Figure 9
From: Handling compromised components in an IaaS cloud installation
![Figure 9](http://media.springernature.com/full/springer-static/image/art%3A10.1186%2F2192-113X-1-16/MediaObjects/13677_2012_Article_21_Fig9_HTML.jpg)
Case Two - A virtual bogus compute worker is added as a consumer’s instance.
Advances, Systems and Applications
From: Handling compromised components in an IaaS cloud installation
Case Two - A virtual bogus compute worker is added as a consumer’s instance.