Fig. 2From: Classifying malware attacks in IaaS cloud environmentsCVE entries for the three classes of attacksBack to article page