1. Memory forensics: The path forward
2. Comparative Analysis of Volatile Memory Forensics: Live Response vs. Memory Imaging
3. [ 3 ] J. Andress , and S. Winterfeld , Chapter 10 - "Computer Network Attack", Cyber Warfare , 2nd Edition , 2017 . [3] J. Andress, and S. Winterfeld, Chapter 10 - "Computer Network Attack", Cyber Warfare, 2nd Edition, 2017.
4. Memory Forensics for QQ from a Live System
5. [ 5 ] M. Graziano , A. Lanzi , and D. Balzarotti , " Hypervisor memory forensics ", Springer Berlin Heidelberg , pp. 21– 40 , 2013 . [5] M. Graziano, A. Lanzi, and D. Balzarotti, "Hypervisor memory forensics", Springer Berlin Heidelberg, pp. 21–40, 2013.