[1]
F. Zhao and H. Jin, “Automated Approach to Intrusion Detection in VM-based Dynamic Execution Environment”, Comput. Inform., vol. 31, no. 2, pp. 271–297, Jul. 2012.