Author:
Kiperberg Michael,Resh Amit,Zaidenberg Nezer
Publisher
Springer International Publishing
Reference43 articles.
1. Afianian A, Niksefat S, Sadeghiyan B, Baptiste D (2019) Malware dynamic analysis evasion techniques: A survey. ACM Comput Surv (CSUR) 52(6):1–28
2. Algawi A, Kiperberg M, Leon R, Resh A, Zaidenberg N (2019) Creating modern blue pills and red pills. In: ECCWS 2019 18th European conference on cyber warfare and security. Academic Conferences, pp 6–14
3. Amit N, Ben-Yehuda M, Yassour BA (2010) IOMMU: Strategies for mitigating the IOTLB bottleneck. In: Computer architecture: ISCA 2010 international workshops A4MMC, AMAS-BT, EAMA, WEED, WIOSCA. Springer, Berlin, pp 256–274
4. Carbone F (2014) Computer forensics with FTK. Packt Publishing
5. Chien E (2005) Techniques of adware and spyware. In: Proceedings of the fifteenth virus bulletin conference, Citeseer
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献