1. Multi class support vector machine implementation to intrusion detection Vol. 3, July 2003,;Ambwani,2003
2. Enabling attack behavior prediction in ubiquitous environments;Anagnostopoulos,2005
3. Graph-based malware detection using dynamic analysis;Anderson;J Comput Virol,2011
4. Standardizing cyber threat intelligence information with the Structured Threat Information eXpression (STIX™);Barnum;MITRE Corp,2012
5. On the resemblance and containment of documents;Broder,1997