1. Pereberina, A., Kostyushko, A., Tormasov, A.: An approach to dynamic malware analysis based on system and application code split. J. Comput. Virol. Hack. Tech. 18(3), 231–241 (2022). https://doi.org/10.1007/s11416-021-00412-z
2. Russinovich, M., Solomon, D., Ionescu, A.: Windows Internals (6th ed.). Parts 1 and 2. Redmond, Washington: Microsoft Press. (2012)
3. Scheduling Priorities. Microsoft. https://docs.microsoft.com/en-us/windows/win32/procthread/scheduling-priorities (2021)
4. Priority Inversion. Microsoft. https://docs.microsoft.com/en-us/windows/win32/procthread/priority-inversion (2021)
5. Priority Boosts. Microsoft. https://docs.microsoft.com/en-us/windows/win32/procthread/priority-boosts (2021)