1. Phelps, R.: Rethinking business continuity: emerging trends in the profession and the manager’s role. J. Bus. Contin. Emerg. Plann. 8(1), 49–58 (2014)
2. Mathur, K., Hiranwal, S.: A survey on techniques in detection and analyzing malware executables. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(4), 422–428 (2013)
3. Idika, N., Mathur, A.P.: A Survey of Malware Detection Techniques. vol. 48, Purdue University (2007)
4. Bacci, A., et al.: Impact of code obfuscation on android malware detection based on static and dynamic analysis. In: 4th International Conference on Information Systems Security and Privacy. Scitepress (2018)
5. Vinod, P., Jaipur, R., Laxmi, V., Gaur, M.: Survey on malware detection methods. In: Proceedings of the 3rd Hackers’ Workshop on Computer and Internet Security (IITKHACK 2009), pp. 74–79 (2009)