1. Ashu S., Sahay S. K.. Evolution and detection of polymorphic and metamorphic malwares: a survey. Int J Comput Appl. 90(2).. 10.5120/15544-4098.
2. Internet security threat report. 2016. Available at: https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf, 2014, [accessed 17.01.2016].
3. Commercial antivirus software effectiveness: an empirical study;Sukwong;Computer (Long Beach Calif),2011
4. Virmon: a virtualization-based automated, dynamic malware analysis system;Tirli,2013
5. Cuckoo foundation. Cuckoo SandboxAvailable at: http://www.cuckoosandbox.org/, [accessed 01.03.2017].