1. Baker, K. (2020), “Malware analysis”, available at: https://www.crowdstrike.com/epp-101/malware-analysis/
2. Camouflage in malware: from encryption to metamorphism;International Journal Of Computer Science And Network Security (IJCSNS),2012
3. Bhojani, N. (2014), “Malware analysis”. doi: 10.13140/2.1.4750.6889.
4. Chumachenko, K. (2017), “Machine learning methods for malware detection and classification”, available at: https://core.ac.uk/download/pdf/80994982.pdf