1. Annachhatre, C., Austin, T., Stamp, M.: Hidden markov models for malware classification. J. Comput. Virol. Hacking Tech., 1–15 (2014).
http://dx.doi.org/10.1007/s11416-014-0215-x
2. Arora, A., Krishnan, R., Telang, R., Yang, Y.: Impact of vulnerability disclosure and patch availability - an empirical analysis. In. Third Workshop on the Economics of Information Security (2004).
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.81.9350
3. Lecture Notes in Computer Science;M Bailey,2007
4. Bayer, U., Comparetti, P.M., Hlauschek, C., Krügel, C., Kirda, E.: Scalable, behavior-based malware clustering. In: Proceedings of NDSS 2009 (2009).
http://www.isoc.org/isoc/conferences/ndss/09/pdf/11.pdf
5. Campbell, N.A.: Biology, 4th edn. The Benjamin/Cummings Publishing Company Inc., New York (1996)