How to Distribute the Detection Load among Virtual Machines to Maximize the Detection of Distributed Attacks in the Cloud? | IEEE Conference Publication | IEEE Xplore