Fig. 5From: An emerging threat Fileless malware: a survey and research challengesA process model for memory forensicsBack to article page