1. Logen, S., Höfken, H., Schuba, M.: Simplifying RAM forensics: a GUI and extensions for the volatility framework. In: Proceedings of the 2012 7th International Conference on Availability, Reliability and Security, ARES 2012, pp. 620–624 (2012)
2. Hargreaves, C., Chivers, H.: Recovery of encryption keys from memory using a linear scan. In: Proceedings of the 3rd International Conference on Availability, Reliability and Security, ARES 2008, pp. 1369–1376, March 2008
3. Vaughan-Nichols, S.J.: Today’s most popular operating systems (2017). http://www.zdnet.com/article/todays-most-popular-operating-systems/ . Accessed 12 Apr 2018
4. Statista, Global market share held by the leading mobile operating systems from 2010 to 2015 (2015). https://www.statista.com/statistics/218089/global-market-share-of-windows-7/ . Accessed 12 Apr 2018
5. Kaspersky, Overall Statistics for 2017, Kaspersky (2017). https://kasperskycontenthub.com/securelist/files/2017/12/KSB_statistics_2017_EN_final.pdf . Accessed 4 Apr 2018