1. Moir, R.: Defining Malware: FAQ. Microsoft TechNet.
https://technet.microsoft.com/en-us/library/dd632948.aspx
(2003). Accessed 17 Feb 2017
2. Symantec.: Internet Security Threat Report, Volume 17. Technical report, Symantec Corporation (2011).
http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_2011_21239364.en-us.pdf
. Accessed 19 May 2018
3. Vinod, P., Jaipur, R., Laxmi, V., Gaur, M.: Survey on malware detection methods. In: Proceedings of the 3rd Hackers’ Workshop on Computer and Internet Security (IITKHACK’09), pp. 74–79 (2009)
4. Wong, W.: Analysis and detection of metamorphic computer viruses. Department of Computer Science, San Jose State University, May, Master’s Thesis (2006)
5. Santos, I., Brezo, F., Ugarte-Pedrero, X., Bringas, P.G.P.: Opcode sequences as representation of executables for data-mining-based unknown malware detection. Inf. Sci. (Ny) 231, 64–82 (2013)