1. Gerber, A.: Connecting all the things in the Internet of Things. https://ibm.co/2qMx97a . Accessed 2017
2. Harrison, L.: The Internet of Things (IoT) Vision. https://blog.equinix.com/blog/2015/03/12/the-internet-of-things-iot-vision/ . Accessed 2015
3. Mohaisen, A., Alrawi, O., Mohaisen, M.: AMAL: high-fidelity, behavior-based automated malware analysis and classification. Comput. Secur. 52, 251–266 (2015)
4. Lecture Notes in Computer Science;A Mohaisen,2014
5. Shang, S., Zheng, N., Xu, J., Xu, M., Zhang, H.: Detecting malware variants via function-call graph similarity. In: Proceedings of the 5th International Conference on Malicious and Unwanted Software, MALWARE, pp. 113–120 (2010)