1. Adrian Martinez, C., Isaza Echeverri, G., Castillo Sanz, A., 2010. Malware detection based on cloud computing integrating intrusion ontology representation. In: Proceedings of the 2010 IEEE Latin-American Conference On Communications. 〈http://dx.doi.org/10.1109/latincom.2010.5641013〉.
2. Av-test.org, 2016. AV-TEST – The Independent IT-Security Institute. Retrieved 14 February 2016, from 〈http://www.av-test.org/en/statistics/malware/〉.
3. Dynamic analysis of malicious code;Bayer;J. Comput. Virol.,2006
4. Bayer, U., Habibi, I., Balzarotti, D., Kirda, E., Kruegel, C., 2009. A view on current malware behaviors. In: LEET'09 Proceedings of the 2nd USENIX Conference on Large-Scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More. USENIX Association Berkeley, CA, USA. pp. 8-8.
5. Bellard, F., 2005. QEMU, a fast and portable dynamic translator. In: ATEC '05 Proceedings of the Annual Conference on USENIX Annual Technical Conference. USENIX Association Berkeley, CA, USA ©2005. Retrieved from 〈http://dl.acm.org/citation.cfm?Id=1247401〉.