Author:
Mikhail Joseph W.,Williams Jamie C.,Roelke George R.
Subject
Law,General Computer Science
Reference52 articles.
1. Best practices for fighting the fileless threat;Baldin;Netw. Secur.,2019
2. Windows memory forensics: detecting (Un) intentionally hidden injected code by examining page table entries;Block;Digital Invest.,2019
3. Evaluation of modified vector space representation using adfa-ld and adfa-wd datasets;Borisaniya;J. Inf. Secur.,2015
4. A survey of intrusion detection systems leveraging host data;Bridges;ACM Comput. Surv. (CSUR),2019
5. Malware classification based on dynamic behavior;Cabau,2016
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献