https://www.sans.org/cyber-security-summit/archives/file/summit_archive_1493741700.pdf
http://forensicinsight.org/wp-content/uploads/2012/03/INSIGHT-An-Introduction-to-Linux-Memory-Forensics.pdf https://developer.android.com/studio/profile/memory-profiler https://core.ac.uk/download/pdf/41535481.pdf https://www.diva-portal.org/smash/get/diva2:677323/FULLTEXT01.pdf https://repository.asu.edu/attachments/140794/content/Sivasankaran_asu_0010N_14301.pdf https://www.usenix.org/system/files/conference/atc18/atc18-hahn.pdf https://repo.zenk-security.com/Forensic/The%20Art%20of%20Memory%20Forensics%20-%20Detecting%20Malware%20and%20Threats%20in%20Windows,%20Linux,%20and%20Mac%20Memory%20(2014).pdf https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/documents/advanced-artifact-handling-toolset https://www.cct.lsu.edu/~golden/Papers/android-memory-analysis-DI.pdf https://github.com/volatilityfoundation/volatility http://www.cs.columbia.edu/~krj/os/lectures/L12-LinuxSched.pdf http://manpages.ubuntu.com/manpages/trusty/man1/volatility.1.html https://en.wikipedia.org/wiki/Paging https://en.wikipedia.org/wiki/Scheduling_(computing) https://www.dynatrace.com/support/help/how-to-use-dynatrace/diagnostics/memory-dump-analysis/ https://man7.org/linux/man-pages/man5/proc.5.html https://indico.cern.ch/event/408139/session/6/contribution/132/attachments/815628/1117588/CHEP06.pdf https://software.intel.com/content/www/us/en/develop/documentation/vtune-help/top/analyze-performance/platform-analysis-group/disk-input-and-output-analysis.html https://www.booleanworld.com/guide-linux-top-command/ https://www.youtube.com/watch?v=enKqmD_8VWw https://www.tutorialspoint.com/operating_system/os_quick_guide.htm https://scholarship.rice.edu/bitstream/handle/1911/88109/REYES-DOCUMENT-2014.pdf?sequence=1&isAllowed=y http://www.qnx.com/developers/docs/7.0.0/#com.qnx.doc.ide.userguide/topic/memanalysis_tool.html https://deepblue.lib.umich.edu/bitstream/handle/2027.42/107701/junzhe.pdf?sequence=1 http://www.opersys.com/downloads/cc-slides/android-debug/slides-main-140521.pdf http://dfir.org/research/omfw.pdf https://www.toptal.com/java/hunting-memory-leaks-in-java https://docs.amp.cisco.com/en/A4E/AMP%20for%20Endpoints%20User%20Guide.pdf https://hal.inria.fr/hal-01758679/document https://developer.apple.com/library/archive/documentation/Performance/Conceptual/ManagingMemory/Articles/AboutMemory.html https://www.guru99.com/process-scheduling.html https://resources.infosecinstitute.com/category/computerforensics/introduction/areas-of-study/digital-forensics/operating-system-forensics/ https://elinux.org/images/6/6c/Linux_Storage_System_Bottleneck_Exploration_V0.3.pdf https://www.kernel.org/doc/html/latest/admin-guide/cgroup-v1/memory.html https://lwn.net/Kernel/Index/ https://linux-audit.com/elf-binaries-on-linux-understanding-and-analysis/ http://docs.nvidia.com/cuda/profiler-users-guide/index.html https://docs.gluster.org/en/latest/Administrator%20Guide/Linux%20Kernel%20Tuning/ -- You received this message because you are subscribed to the Google Groups "linuxkernelnewbies" group. To unsubscribe from this group and stop receiving emails from it, send an email to linuxkernelnewbies+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/linuxkernelnewbies/CAHnt0GVZQyW8P9O7OJyAkG0mzVC5Xn4tJ-8nFod3THpX8rOB6Q%40mail.gmail.com.