1. Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining;Nissim;Knowl. Based Syst.,2018
2. VirtualBox;Oracle,2019
3. Penetration Testing Software, Penetration Testing Technology;Metasploit,2019
4. AV Evasion Artware;Shellter,2018
5. Veil-Framework, Veil-Evasion,2017