1. Holt, T.J., Leukfeldt, R., Van De Weijer, S.: An examination of motivation and routine activity theory to account for cyberattacks against Dutch web sites. Crim. Justice Behav. 47(4), 487–505 (2020)
2. Ozer, M., Varlioglu, S., Gonen, B., Adewopo, V., Elsayed, N., Zengin S.: Cloud incident response: Challenges and opportunities. In: 2020 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, pp. 49–54 (2020)
3. Blunden, B.: The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System. Jones & Bartlett Publishers, pp. 783 (2012)
4. Harley, D., Lee, A.: The root of all evil? - rootkits revealed, pp. 1–17 (2007)
5. Chen, X., Andersen, J., Mao, Z.M., Bailey, M., Nazario, J.: Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. In: 2008 IEEE International Conference on Dependable Systems and Networks with FTCS and DCC (DSN). IEEE, pp. 177–186 (2008)