Fig. 3From: Classifying malware attacks in IaaS cloud environmentsVulnerabilities exploited for hypervisor DoSBack to article page