References
- S. Momina Tabish, M. Zubair Shafiq, and Muddassar Farooq, "Malware Detection using Statistical Analysis of Byte-Level File Content", the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, June 2009.
- Bilar, Daniel. "Opcodes as predictor for malware." International Journal of Electronic Security and Digital Forensics, pp. 156-168. January 2007.
- Santos, I., Penya, Y. K., Devesa, J., & Bringas, P. G. "N-grams-based File Signatures for Malware Detection", ICEIS, pp. 317-320, 2009
- Park, Y. J., Zhang, Z., & Chen, S. "Run-time detection of malwares via dynamic control-flow inspection", Application-specific Systems, Architectures and Processors, pp. 223-226, July 2009
- Zhang, Qinghua, and Douglas S. Reeves. "Metaaware: Identifying metamorphic malware." Computer Security Applications Conference, pp. 411-420, December, 2007.
- Tahan, Gil, Lior Rokach, and Yuval Shahar. "Mal-ID: Automatic Malware Detection Using Common Segment Analysis and Meta-Features." The Journal of Machine Learning Research pp. 949-979, 2012
- Robert Sedgwick, ALGORITHMS. Second Edition, Addison-Wesley Publishing, Company, Inc. 1988.
- Vxheaven, http://vx.netlux.org/