1. E. M. Rudd, A. Rozsa, M. Günther, and T. E. Boult, A Survey of Stealth Malware: Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions, (2016) pp. 1–28,.
2. D. A. Wahab, Facing cyberattacks in 2016 and beyond,
http://www.thestar.com.my/tech/tech-opinion/2016/01/28/facing-cyber-attacks-in-2016-and-beyond/
, (2016).
3. J. D. , K.Grant, Leading Issues in Knowledge Management. Academic Conference and Publishing Limited., (2015).
4. NIST, Framework for Improving Critical Infrastructure Cybersecurity,” Natl. Inst. S, (2014) pp. 1–41,.
5. A. Henry, The Difference Between Antivirus and Anti-Malware,
https://lifehacker.com/the-difference-between-antivirus-and-anti-malware-and-1176942277
, (2013).