nth order References II P. Baecher, M. Koetter, T. Holz, M. Dornseif, and F. Freiling, The nepenthes platform: An e cient approach to collect malware, Lecture notes in computer science (2006), 165–184. Bill Blunden, The rootkit arsenal: Escape and evasion in the dark corners of the system, Wordware Publishing, 2009. D. Bilar, J. Murphy, and G. Cybenko, Adversarial dynamics: Conficker case study, Moving Target Defenses (S. Jajodia, ed.), vol. II, Springer, 2013, pp. 41–71. Alvaro A. Cárdenas, Saurabh Amin, Zong-Syun Lin, Yu-Lun Huang, Chi-Yen Huang, and Shankar Sastry, Attacks against process control systems: risk assessment, detection, and response, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (New York, NY, USA), ASIACCS ’11, ACM, 2011, pp. 355–366. X. Chen, J. Andersen, Z.M. Mao, M. Bailey, and J. Nazario, Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware, Dependable Systems and Networks With FTCS and DCC, 2008. DSN 2008. IEEE International Conference on, IEEE, 2008, pp. 177–186. George Cybenko and Vincent Berk, An overview of process query systems, Proc. SPIE, vol. 5403, 2004. , Process detection in homeland security and defense applications, Proc. SPIE 6201 (2006). Varun Chandola, Arindam Banerjee, and Vipin Kumar, Anomaly detection: A survey, ACM Comput. Surv. 41 (2009), no. 3, 15:1–15:58.