ByViktor SobieckiOctober 29, 2016UTILIZING MEMORY AND NETWORK FORENSICS FOR SCALABLE THREAT DETECTION AND RESPONSESoftware