1. Comparative analysis of operational malware dynamic link library (dll) injection live response vs. memory image;Alasiri,2012
2. Comparative analysis of volatile memory forensics, live response vs. memory imaging;Aljaedi,2011
3. HelDroid: Dissecting and detecting mobile ransomware;Andronio,2015
4. Xen and the art of virtualization;Barham;ACM SIGOPS Operating Systems Review,2003
5. Ransomware digital extortion: A rising new age threat;Bhardwaj;Indian Journal of Science and Technology,2016