Cited By
View all- Zhang NZhang RSun KLou WHou YJajodia S(2018)Memory Forensic Challenges Under Misused Architectural FeaturesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2018.281911913:9(2345-2358)Online publication date: 1-Sep-2018
- Kirmani MBanday M(2018)Analyzing Detection Avoidance of Malware by Process Hiding2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)10.1109/IC3I44769.2018.9007293(293-297)Online publication date: Oct-2018
- Chen YKhandaker MWang Z(2017)Secure In-Cache ExecutionResearch in Attacks, Intrusions, and Defenses10.1007/978-3-319-66332-6_17(381-402)Online publication date: 12-Oct-2017
- Show More Cited By