1. Common Weakness Enumeration. [Accessed: 08-15-2023].
2. Malware Obfuscation Techniques: A Brief Survey. IEEE Computer Society, 2010.
3. Bilal Ahmad. Real time detection of spectre and meltdown attacks using machine learning. CoRR abs/2006.01442, 2020.
4. Abdulrahman Alaql, Saranyu Chattopadhyay, Prabuddha Chakraborty, Tamzidul Hoque, and Swarup Bhunia. Lego: A learning-guided obfuscation framework for hardware IP protection. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021.
5. Nicoló Andronio, Stefano Zanero, and Federico Maggi. HelDroid: Dissecting and detecting mobile ransomware. In international symposium on recent advances in intrusion detection, pages 382–404. Springer, 2015.