1. Alazab, M., Layton, R., Venkataraman, S., & Watters, P. (2010). Malware detection based on structural and behavioural features of api calls. In The 1st International Cyber Resilience Conference (pp. 1–10). Perth, Western Australia.
2. OBA2: an Onion approach to binary code authorship attribution;Alrabaee;Digital Investigation,2014
3. Anderson, R., Barton, C., Böhme, R., Clayton, R., Van Eeten, M. J., Levi, M., et al. (2013). Measuring the cost of cybercrime. In The economics of information security and privacy (pp. 265–300). Berlin, Heidelberg: Springer.
4. Androutsopoulos, I., et al. (2000). Learning to filter spam e-mail: A comparison of a naive Bayesian and a memory-based approach. arXiv preprint cs/0009009.
5. Style consistency and authorship attribution: a statistical investigation*;Bagavandas;Journal of Quantitative Linguistics,2008