1. Anagnostakis, K.G., Sidiroglou, S., Akritidis, P., Xinidis, K., Markatos, E., Keromytis, A.D.: Detecting targeted attacks using shadow honeypots. In: Proceedings of the 14 th USENIX Security Symposium (2005)
2. Arnold, W., Tesauro, G.: Automatically generated Win32 heuristic virus detection. In: Proceedings of the 2000 International Virus Bulletin Conference (2000)
3. Assaleh, T.A., Cercone, N., Keselj, V., Sweidan, R.: Detection of new malicious code using N-grams signatures. In: Proceedings of the Second Annual Conference on Privacy, Security and Trust, pp. 193–196 (2004)
4. Balzer, R., Goldman, N.: Mediating Connectors. In: Proceedings of the 19 th IEEE International Conference on Distributed Computing Systems Workshop, Austin, TX, pp. 73–77 (1999)
5. Cavnar, W., Trenkle, J.: N-gram based text categorization. In: Proceedings of SDAIR 1994, 3rd Annual Symposium on Document Analysis and Information Retrieval, pp. 161–175 (1994)