1. Ahmadi, M., Sami, A., Rahimi, H., Yadegari, B.: Feature: malware detection by behavioural sequential patterns. Comput. Fraud Secur. 8, 11–19 (2013)
2. Choudhary, S., Vidyarthi, M.D.: A simple method for detection of metamorphic malware using dynamic analysis and text mining. Procedia Comput. Sci. 54, 265–270 (2015)
3. CodeWeavers. Technical White Paper: Running applications under crossover: an analysis of security risks (2008)
4. Davis, M.A., Bodmer, S.M., Lemasters, A.: Hacking Exposed Malware and Rootkits: Malware and Rootkits Secrets and Solutions. McGraw-Hill Education, New York (2009)
5. Elisan, C.C.: Malware, Rootkits & Botnets: A Beginner’s Guide. McGraw-Hill Education, New York (2012)