1. Live forensic analysis of kernel code for malware detection in cloud computing environments;Ahmed,2013
2. Integrity checking of function pointers in kernel pools via virtual machine introspection;Ahmed,2013
3. Modchecker: kernel module integrity checking in the cloud environment;Ahmed,2012
4. Idtchecker: rule-based integrity checking of interrupt descriptor tables in cloud environments;Ahmed,2013
5. ASERT Team, 2018. Donot Team Leverages New Modular Malware Framework in South Asia. https://de.netscout.com/blog/asert/donot-team-leverages-new-modular-malware-framework-south-asia.