1. Alzuri A. et al. The Growth of Fileless Malware. 5. Alzuri A. et al. The Growth of Fileless Malware. 5.
2. Barbhuiya S. et al. 2018. RADS: Real-time Anomaly Detection System for Cloud Data Centres. arXiv:1811.04481 [cs]. (Nov. 2018). Barbhuiya S. et al. 2018. RADS: Real-time Anomaly Detection System for Cloud Data Centres. arXiv:1811.04481 [cs]. (Nov. 2018).
3. Beware of Attackers Stealing Your Computing Power for their Cryptomining Operations: 2018. https://www.f5.com/labs/articles/threat-intelligence/beware-of-attackers-stealing-your-computing-power-for-their-cryptomining-operations.html. Accessed: 2019-11-17. Beware of Attackers Stealing Your Computing Power for their Cryptomining Operations: 2018. https://www.f5.com/labs/articles/threat-intelligence/beware-of-attackers-stealing-your-computing-power-for-their-cryptomining-operations.html. Accessed: 2019-11-17.
4. Cryptojacking and Crypto Mining - Tesla Kubernetes and Jenkins Exploits: 2018. https://neuvector.com/container-security/cryptojacking-crypto-mining-tesla-kubernetes-jenkins-exploits/. Accessed: 2019-11-16. Cryptojacking and Crypto Mining - Tesla Kubernetes and Jenkins Exploits: 2018. https://neuvector.com/container-security/cryptojacking-crypto-mining-tesla-kubernetes-jenkins-exploits/. Accessed: 2019-11-16.