https://www.sans.org/cyber-security-summit/archives/file/summit_archive_1493741700.pdf

http://forensicinsight.org/wp-content/uploads/2012/03/INSIGHT-An-Introduction-to-Linux-Memory-Forensics.pdf

https://developer.android.com/studio/profile/memory-profiler

https://core.ac.uk/download/pdf/41535481.pdf

https://www.diva-portal.org/smash/get/diva2:677323/FULLTEXT01.pdf

https://repository.asu.edu/attachments/140794/content/Sivasankaran_asu_0010N_14301.pdf

https://www.usenix.org/system/files/conference/atc18/atc18-hahn.pdf

https://repo.zenk-security.com/Forensic/The%20Art%20of%20Memory%20Forensics%20-%20Detecting%20Malware%20and%20Threats%20in%20Windows,%20Linux,%20and%20Mac%20Memory%20(2014).pdf

https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/documents/advanced-artifact-handling-toolset

https://www.cct.lsu.edu/~golden/Papers/android-memory-analysis-DI.pdf

https://github.com/volatilityfoundation/volatility

http://www.cs.columbia.edu/~krj/os/lectures/L12-LinuxSched.pdf

http://manpages.ubuntu.com/manpages/trusty/man1/volatility.1.html

https://en.wikipedia.org/wiki/Paging

https://en.wikipedia.org/wiki/Scheduling_(computing)

https://www.dynatrace.com/support/help/how-to-use-dynatrace/diagnostics/memory-dump-analysis/

https://man7.org/linux/man-pages/man5/proc.5.html

https://indico.cern.ch/event/408139/session/6/contribution/132/attachments/815628/1117588/CHEP06.pdf

https://software.intel.com/content/www/us/en/develop/documentation/vtune-help/top/analyze-performance/platform-analysis-group/disk-input-and-output-analysis.html

https://www.booleanworld.com/guide-linux-top-command/

https://www.youtube.com/watch?v=enKqmD_8VWw

https://www.tutorialspoint.com/operating_system/os_quick_guide.htm

https://scholarship.rice.edu/bitstream/handle/1911/88109/REYES-DOCUMENT-2014.pdf?sequence=1&isAllowed=y

http://www.qnx.com/developers/docs/7.0.0/#com.qnx.doc.ide.userguide/topic/memanalysis_tool.html

https://deepblue.lib.umich.edu/bitstream/handle/2027.42/107701/junzhe.pdf?sequence=1

http://www.opersys.com/downloads/cc-slides/android-debug/slides-main-140521.pdf

http://dfir.org/research/omfw.pdf

https://www.toptal.com/java/hunting-memory-leaks-in-java

https://docs.amp.cisco.com/en/A4E/AMP%20for%20Endpoints%20User%20Guide.pdf

https://hal.inria.fr/hal-01758679/document

https://developer.apple.com/library/archive/documentation/Performance/Conceptual/ManagingMemory/Articles/AboutMemory.html

https://www.guru99.com/process-scheduling.html

https://resources.infosecinstitute.com/category/computerforensics/introduction/areas-of-study/digital-forensics/operating-system-forensics/

https://elinux.org/images/6/6c/Linux_Storage_System_Bottleneck_Exploration_V0.3.pdf

https://www.kernel.org/doc/html/latest/admin-guide/cgroup-v1/memory.html

https://lwn.net/Kernel/Index/

https://linux-audit.com/elf-binaries-on-linux-understanding-and-analysis/

http://docs.nvidia.com/cuda/profiler-users-guide/index.html

https://docs.gluster.org/en/latest/Administrator%20Guide/Linux%20Kernel%20Tuning/

-- 
You received this message because you are subscribed to the Google Groups 
"linuxkernelnewbies" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to linuxkernelnewbies+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/linuxkernelnewbies/CAHnt0GVZQyW8P9O7OJyAkG0mzVC5Xn4tJ-8nFod3THpX8rOB6Q%40mail.gmail.com.

Reply via email to