1. Hyrum S. Anderson and Phil Roth . 2018 . EMBER : An Open Dataset for Training Static PE Malware Machine Learning Models. CoRR abs/1804.04637 (2018). arXiv:1804.04637 http://arxiv.org/abs/1804.04637 Hyrum S. Anderson and Phil Roth. 2018. EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models. CoRR abs/1804.04637 (2018). arXiv:1804.04637 http://arxiv.org/abs/1804.04637
2. HPCMalHunter: Behavioral malware detection using hardware performance counters and singular value decomposition
3. Karel Bartos , Michal Sofka , and Vojtech Franc . 2016 . Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants. In 25th USENIX Security Symposium, USENIX Security 16 , Austin, TX, USA, August 10--12 , 2016. 807--822. Karel Bartos, Michal Sofka, and Vojtech Franc. 2016. Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants. In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10--12, 2016. 807--822.
4. Ulrich Bayer , Paolo Milani Comparetti , Clemens Hlauschek , Christopher Krügel , and Engin Kirda . 2009 . Scalable, Behavior-Based Malware Clustering . In Proceedings of the Network and Distributed System Security Symposium, NDSS 2009 , San Diego, California, USA, 8th February - 11th February 2009. The Internet Society. Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Krügel, and Engin Kirda. 2009. Scalable, Behavior-Based Malware Clustering. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2009, San Diego, California, USA, 8th February - 11th February 2009. The Internet Society.
5. CAIDA. 2001 . CAIDA Analysis of Code-Red . CAIDA. Retrieved March 10, 2022 from https://www.caida.org/archive/code-red/ CAIDA. 2001. CAIDA Analysis of Code-Red. CAIDA. Retrieved March 10, 2022 from https://www.caida.org/archive/code-red/