1. D. Kiwia, A. Dehghantanha, K.K.R. Choo, J. Slaughter, A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence. J. Comput. Sci. 27, 394–409 (2018)
2. H. Karimipour, S. Geris, A. Dehghantanha, H. Leung, Intelligent Anomaly Detection for Large-Scale Smart Grids (IEEE CCECE, Edmonton, 2019), pp. 1–4
3. F.N. Dezfouli, A. Dehghantanha, R. Mahmod, N.F.B.M. Sani, S.B. Shamsuddin, F. Daryabar, A survey on malware analysis and detection techniques. Int. J. Adv. Comput. Technol. 5(14), 42 (2013)
4. N.B. Anuar, M. Papadaki, S. Furnell, N. Clarke, An investigation and survey of response options for Intrusion Response Systems (IRSs), in 2010 Information Security for South Africa (IEEE, 2010 August), pp. 1–8
5. M. Baig, P. Zavarsky, R. Ruhl, D. Lindskog, The Study of Evasion of Packed PE from Static Detection (World Congress on. Internet Security (WorldCIS), 2012), pp. 99–104