Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image
Fig. 1 | Journal of Cloud Computing

Fig. 1

From: Classifying malware attacks in IaaS cloud environments

Fig. 1

A generic cloud scenario showing every actor, namely the EE, the CP, and the VM, as source or target of attack. Dashed red arrows represent a VM being a target and blue arrows represent a VM being source of attacks. Dotted arrows represent directions of attacks that do not involve VMs

Back to article page