Login / Signup
MemInspect: Memory Forensics for investigating Fileless Attacks.
Tao Leng
Yuedong Pan
Lixin Zhao
Aimin Yu
Ziyuan Zhu
Lijun Cai
Dang Meng
Published in:
TrustCom (2023)
Keyphrases
</>
countermeasures
memory usage
data corruption
attack detection
computing power
traffic analysis
data sets
computer security
cyber attacks
memory requirements
memory space
limited memory
document analysis
security mechanisms
security risks
malicious attacks
associative memory
malicious users