1. ACM, 2019. Computing surveys. https://csur.acm.org/.
2. Adversarial deep learning for robust detection of binary encoded malware;Al-Dujaili,2018
3. Improving accuracy of android malware detection with lightweight contextual awareness;Allen,2018
4. Catching predators at watering holes: finding and understanding strategically compromised websites;Alrwais,2016
5. Anderson, R., Moore, T., 2005. The economics of information security. https://www.cl.cam.ac.uk/~rja14/Papers/sciecon2.pdf.