1. Li, X., Loh, P.K.K., Tan, F.: Mechanisms of polymorphic and metamorphic viruses. In: 2011 European Intelligence and Security Informatics Conference (EISIC), pp. 149–154. IEEE (2011)
2. Linn, C., Debray, S.: Obfuscation of executable code to improve resistance to static disassembly. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 290–299. ACM (2003)
3. Peng, H., Long, F., Ding, C.: Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy. IEEE Trans. Pattern Anal. Mach. Intell. 27(8), 1226–1238 (2005)
4. Schultz, M.G., Eskin, E., Zadok, E., Stolfo, S.J.: Data mining methods for detection of new malicious executables. In: Proceedings of IEEE Symposium on Security and Privacy, 2001, S&P 2001, pp. 38–49. IEEE (2001)
5. Santos, I., Brezo, F., Nieves, J., Penya, Y.K., Sanz, B., Laorden, C., Bringas, P.G.: Idea: Opcode-sequence-based malware detection. In: Engineering Secure Software and Systems, pp. 35–43. Springer Berlin Heidelberg (2010)