[1]Moore D, Paxson V, Savage S, et al. Inside the slammer worm[J]. Security & Privacy Institute of Electrical and Electronics Engineers, 2003, 1(4): 3339[2]Justin Moore, Wojciech L, Luis R, et al. Live off the land? How about bringing your own island? An overview of UNC1945[ROL].[20250101]. https:www.mandiant.comresourcesbloglive off the land an overview of unc1945[3]Carvalho L, Ado T, Morais R, et al. Conventional and zero trust security measures for precision agriculture devices: The mySense’s vine inspector casestudy[J]. Procedia Computer Science, 2025, 256(C): 246254[4]Leng T, Zhao L, Pan Y, et al. Early detection of fileless attacks based on multifeature fusion of complex attack vectors[C] Proc of the 2024 IEEE Symp on Computers and Communications (ISCC). Piscataway, NJ: IEEE, 2024: 17[5]Borana P, Sihag V, Choudhary G, et al. An assistive tool for fileless malware detection[C] Proc of the 2021 World Automation Congress (WAC). Piscataway, NJ: IEEE, 2021: 2125[6]Kara I. Fileless malware threats: Recent advances, analysis approach through memory forensics and research challenges[J]. Expert Systems with Applications, 2023, 214(C): 957974 [7]Wu M H, Hsu F H, Huang J H, et al. Enhancing linux system security: A kernelbased approach to fileless malware detection and Mitigation[J]. Electronics, 2024, 13(17): 356369[8]Ezeonwu I J, Musa S M. Comparative analysis of machine learning classifiers for fileless malware detection[C] Proc of the 2024 Int Conf on Green Energy, Computing and Sustainable Technology (GECOST). Piscataway, NJ: IEEE, 2024: 16[9]Liu S, Peng G, Zeng H, et al. A survey on the evolution of fileless attacks and detection techniques[J]. Computers & Security, 2023, 137: 10361053[10]Alvarez V M. Yara: The pattern matching Swiss knife[EBOL]. [20250914]. https:github.comVirusTotalyara. [11] Kara I. Fileless malware threats: Recent advances, analysis approach through memory forensics and research challenges[J]. Expert Systems with Applications, 2023, 214: 119133[12]Lee G M, Shim S W, Cho B M, et al. Fileless cyberattacks: Analysis and classification[J]. ETRI Journal, 2021, 43(2): 332343[13]王铃铜, 王慧玲, 徐苗, 等. 跨站脚本攻击检测与防御技术综述[J]. 计算机应用研究, 2024, 41(3): 652662[14]Stiawan D, Idris M Y B, Bamhdi A M, et al. CICIDS2017 dataset feature analysis with information gain for anomaly detection[J]. IEEE Access, 2020, 8: 132911132921[15]Tokyoneon. Chimera[EBOL]. [20240325]. https:github.comtokyoneonChimera[16]Hannon D. InvokeObfuscation[EBOL]. [20230427]. https:github.comdanielbohannonInvokeObfuscation |