1. McAfee. Part of Intel Security., “Threats report,” McAfee., Technical Report, Aug 2015. Accessed 19 Sep 2015
2. S. Ravi, N. Balakrishnan, B. Venkatesh, Behavior-based malware analysis using profile hidden markov models, in 2013 International Conference on Security and Cryptography (SECRYPT), July 2013, pp. 1–12
3. “Virustotal,” https://www.virustotal.com/ . Accessed 10 Aug 2015
4. L. Seltzer, Tools for Analyzing Static Properties of Suspicious Files on Windows, 2014
5. G. Amato, “Peframe,” https://github.com/guelfoweb/peframe , Nov 2015. Accessed 17 June 2015