1. Adelstein, F.: Live forensics: Diagnosing your system without killing it first. Commun. ACM 49(2), 63–66 (2006)
2. Al-Shaer, E., Jha, S., Keromytis, A.D. (eds.): Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13. ACM (2009)
3. AMD: Amd virtualization (2014),
http://www.amd.com/us/solutions/servers/virtualization/Pages/virtualization.aspx
4. Arasteh, A.R., Debbabi, M.: Forensic memory analysis: From stack and code to execution history. Digital Investigation 4, 114–125 (2007)
5. Athreya, M.B.: Subverting linux on-the-fly using hardware virtualization technology (2010)