1. D. Uppal, R. Sinha, V. Mehra, and V. Jain, "Malware detection and classification based on extraction of API sequences," in 2014 International conference on advances in computing, communications and informatics (ICACCI), 2014, pp. 2337-2342.
2. W. Gharibi, "Studying and Classification of the Most Significant Malicious Software," arXiv preprint arXiv:1106.0853, 2011.
3. S. Divya, "A survey on various security threats and classification of malware attacks, vulnerabilities and detection techniques," International Journal of Computer Science & Applications (TIJCSA), vol. 2, 2013.
4. A. A. Younis, E. Stronberg, and S. Noor, "User’s Susceptibility Factors to Malware Attacks: A Systemic Literature Review," International Journal of Computer and Information Engineering, vol. 15, pp. 543-554, 2021.
5. T. M. Chen and J.-M. Robert, "The evolution of viruses and worms," Statistical methods in computer security, vol. 1, pp. 1-16, 2004.