1. Hunting for metamorphic Javascript malware;Musale;J. Comput. Virol. Hacking Tech.,2015
2. Malware obfuscation techniques: a brief survey;You,2010
3. Email Statistics Report;The Radicati Group,2016
4. Internet Security Threat Report;Symantec Corporation,2015
5. Security Intelligence Report;Microsoft Corporation,2015