1. Bruschi D, Martignoni L, Monga M. Using code normalization for fighting self-mutating malware. IEEE Security and Privacy. 2007. 5:2:46–54. DOI: 10.1109/MSP.2007.31.
2. Bilar D. Opcodes as predicator for malware. International Journal of Electronic Security and Digital Forensics. 2007;1:2:156–168. DOI: 10.1504/IJESDF.2007.016865.
3. Borello J M. Study of computer virus metamorphism: modelling, design and detection [thesis]. Rennes: Université de Rennes; 2011.
4. Colbourn C J, Dinitz J H. Handbook of combonatorial designs. 2nd ed. New York: Chapman et Hall/CRC Press; 2006. 1016 p. ISBN: 1-58488-506-8.
5. DAVFI projet homepage [Internet]. 2012. Available from: http://davfi.fr/index_en.html [Accessed 2017-01-20].