1. Aljaedi, A., Lindskog, D., Zavarsky, P., Ruhl, R., & Almari, F. (2011). Comparative analysis of volatile memory forensics, live response vs. memory imaging. In Proceedings - 2011 IEEE international conference on privacy, security, risk and trust and IEEE international conference on social computing, PASSAT/SocialCom 2011 pp. 1253–1258.
2. Chest pathology identification using deep feature selection with non-medical training;Bar;Computer Methods in Biomechanics and Biomedical Engineering: Imaging and Visualization,2018
3. Representation learning: A review and new perspectives;Bengio;IEEE Transactions on Pattern Analysis and Machine Intelligence,2013
4. Bulazel, A., & Yener, B. (2017). A survey on automated dynamic malware analysis evasion and counter-evasion. In Proceedings of the 1st reversing and offensive-oriented trends symposium on - ROOTS, (November 2017), pp. 1–21.
5. Pillow library;Clark,2010