1. The illustrated wavelet transform handbook: introductory theory and applications in science, engineering, medicine and finance;Addison,2002
2. Drebin: Effective and explainable detection of android malware in your pocket;Arp,2014
3. Structural entropy and metamorphic malware;Baysa;Journal of computer virology and hacking techniques,2013
4. Bhattacharya, S., Menéndez, H. D., Barr, E., & Clark, D. (2016). Itect: Scalable information theoretic similarity for malware detection. arXiv:1609.02404.
5. Security evaluation of pattern classifiers under attack;Biggio;IEEE Transactions on Knowledge and Data Engineering,2014