1. Trend Micro, Addressing Big Data Security Challenges: The Right Tools for Smart Protection, 2012. http://www.trendmicro.com/cloud-content/us/pdfs/business/white-papers/wp_addressing-big-data-security-challenges.pdf. Accessed: 2014-5-25.
2. Infographic: The State of Malware 2013. http://www.mcafee.com/in/security-awareness/articles/state-of-malware-2013.aspx. Accessed: 2014-5-25.
3. Gandotra, E., Bansal, D., and Sofat, S. 2014. Malware Analysis and Classification: A Survey. Journal of Information Security 5, 2 (April, 2014), 56--65. DOI= 10.4236/jis.2014.52006
4. Egele, M., Scholte, T., Kirda, E., and Kruegel, C. 2012. A Survey on Automated Dynamic Malware-Analysis Techniques and Tools. Journal in ACM Computing Surveys 44, 2 (February, 2012), 6. DOI = 10.1145/2089125.2089126
5. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., and Witten, I. 2009. The WEKA Data Mining Software: An Update. ACM SIGKDD Explorations Newsletter, 2009, 11, 1 (2009), 10--18. DOI = 10.1145/1656274.1656278