1. Case, Andrew, and Golden G. Richard III. "Memory forensics: The path forward." Digital Investigation 20 (2017): 23–33.
2. Ligh, Michael Hale, et al. The art of memory forensics: detecting malware and threats in windows, linux, and Mac memory. John Wiley & Sons, 2014.
3. Sharif, Monirul, et al. "Eureka: A framework for enabling static malware analysis.
4. Ernst, Michael D. "Static and dynamic analysis: Synergy and duality." (2003).
5. Kendall, Kris, and Chad McMillan. "Practical malware analysis." Black Hat Conference, USA. 2007.