1 Seong Il Bae, "Unpacking Technique for Process Injection Malware" 2018
2 Willems, "Toward automated dynamic malware analysis using cwsandbox. IEEE Security & Privacy" 5 (5): 32-39, 2007
3 Jesse Smelcer, "The rise of Fileless malware"
4 Liam O’ Murchu, "The evolution of the fileless click-fraud malware Poweliks"
5 David Patten, "The Evolution to Fileless Malware" East Carolina University 2017
6 Kris, Kendall, "Practical “Malware Analysis”" 10-, 2007
7 Sikorski, Michael, "Practical malware analysis: the hands-on guide to dissecting malicious software" 2012
8 Nasi, "PE Injection Explained Advanced memory code injection technique"
9 Yang-seo Choi, "PE File Header Analysis-Based Packed PE File Detection Technique (PHAD)" 28-31, 2008
10 You, Ilsun, "Malware obfuscation techniques: A brief survey" IEEE 297-300, 2010
1 Seong Il Bae, "Unpacking Technique for Process Injection Malware" 2018
2 Willems, "Toward automated dynamic malware analysis using cwsandbox. IEEE Security & Privacy" 5 (5): 32-39, 2007
3 Jesse Smelcer, "The rise of Fileless malware"
4 Liam O’ Murchu, "The evolution of the fileless click-fraud malware Poweliks"
5 David Patten, "The Evolution to Fileless Malware" East Carolina University 2017
6 Kris, Kendall, "Practical “Malware Analysis”" 10-, 2007
7 Sikorski, Michael, "Practical malware analysis: the hands-on guide to dissecting malicious software" 2012
8 Nasi, "PE Injection Explained Advanced memory code injection technique"
9 Yang-seo Choi, "PE File Header Analysis-Based Packed PE File Detection Technique (PHAD)" 28-31, 2008
10 You, Ilsun, "Malware obfuscation techniques: A brief survey" IEEE 297-300, 2010
11 "AhnLab Security Emergency response Center Report, 2017 Q4 Cyber Threat Trend Report"