1. Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection
2. Huseyn Huseynov , Kenichi Kourai , Tarek Saadawi , and Obinna Igbe . 2020 . Virtual Machine Introspection for Anomaly-Based Keylogger Detection. In 2020 IEEE 21st International Conference on High Performance Switching and Routing (HPSR). 1–6. https://doi.org/10 .1109/HPSR48589.2020.9098980 10.1109/HPSR48589.2020.9098980 Huseyn Huseynov, Kenichi Kourai, Tarek Saadawi, and Obinna Igbe. 2020. Virtual Machine Introspection for Anomaly-Based Keylogger Detection. In 2020 IEEE 21st International Conference on High Performance Switching and Routing (HPSR). 1–6. https://doi.org/10.1109/HPSR48589.2020.9098980
3. Divya Kapil and Preeti Mishra . 2021. Virtual Machine Introspection in Virtualization: A Security Perspective . Association for Computing Machinery , New York, NY, USA , 117–124. https://doi.org/10.1145/3474124.3474140 10.1145/3474124.3474140 Divya Kapil and Preeti Mishra. 2021. Virtual Machine Introspection in Virtualization: A Security Perspective. Association for Computing Machinery, New York, NY, USA, 117–124. https://doi.org/10.1145/3474124.3474140
4. Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system
5. VMShield: Memory Introspection-Based Malware Detection to Secure Cloud-Based Services Against Stealthy Attacks