1. Huda S, Islam R, Abawajy J, Yearwood J, Hassan MM, Fortino G (2018) A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection. Future Gener Comput Syst 83:193–207
2. Nikolopoulos SD, Polenakis I (2017) Preventing malware pandemics in mobile devices by establishing response-time bounds. J Inf Secur Appl 37:1–14
3. Salehi Z, Sami A, Ghiasi M (2014) Using feature generation from API calls for malware detection. Comput Fraud Secur 2014(9):9–18
4. Marpaung JAP, Sain M, Hoon-Jae L (2012) Survey on malware evasion techniques: state of the art and challenges. In: 2012 14th International Conference Advanced Communication Technology (ICACT), pp 744–749 ISSN: 1738-9445. Retrieved from
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6174775
5. Hwang HJ, Tak JI, Nah SY (2011) The perception of computer security focused on the familiarity of rootkits in Korea and Kazakhstan. Int J Softw Eng Appl 5(2):13–24