Research Article

Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

Figure 3

(a) Type 1 and (b) Type 2 hypervisors. [13].
(a)
(b)