1. Mitigating the risks of fileless attacks
2. W. Campbell. 2014. Volatile memory acquisition tools - A comparison across taint and correctness. Proceedings of the 11th Australian Digital Forensics Conference, ADF 2013 (01 2014), 10–19.
3. Brian Carrier. 2005. File System Forensic Analysis. Addison-Wesley Professional.
4. Memory forensics: The path forward
5. Jacob Cohen and Jacob Willem Cohen. 1988. Statistical power analysis for the behavioral sciences (2. ed. ed.). Erlbaum, Hillsdale, NJ [u.a.]. XXI, 567 S. pages. Literaturverz. S. 553 - 558.