1. An Overview about the Polymorphic Worms Signatures;Moftah,2015
2. A web engineering security methodology for e-learning systems;Aljawarneh,2011
3. Cloud security engineering: avoiding security threats the right way;Aljawarneh;Int. J. Cloud Appl. Comput.,2011
4. C. Kruegel, E. Kirda, D. Mutz, W. Robertson, G. Vigna, Polymorphic worm detection using structural information of executables, 2006 [Online]. Available from: http://www.springerlink.com/content/f1k63052u27p6438/ (accessed 6.07.2010).
5. Y. Tang, X. Lu, B. Xiao, Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms, 2009 [Online]. Available from: http://www.springerlink.com/content/f1k63052u27p6438/ (accessed 6.07.2010).