Detecting the run time attacks in the cloud with an evidence collection based approach | IEEE Conference Publication | IEEE Xplore