1. Two-point step size gradient methods;Barzilai;IMA J Numer Anal,1998
2. Crowdroid: behavior-based malware detection system for android;Burguera,2011
3. System call-based detection of malicious processes;Canzanese,2015
4. Control flow-based malware variant detection;Cesare;IEEE Trans Depend Secur Comput (TDSC),2014
5. Control flow-based malware variant detection;Cesare;IEEE Trans Depend Secur Comput (TDSC),2014