1. N-gram-based detection of new malicious code;Abou-Assaleh,2004
2. Detecting targeted malicious email;Amin;Secur Priv IEEE,2012
3. Finding rules for heuristic detection of malicious pdfs: with analysis of embedded exploit code;Baccas,2010
4. Scalable, behavior-based malware clustering;Bayer,2009
5. Real time detection and analysis of PDF-files;Borg,2013