1. Y. Qin and T. Xia, “Sensi tivity analysis of ring oscillator based hardware Trojan detection,” Int. Conf. Commun. Technol. Proceedings, ICCT, vol. 2017-Octob, pp. 1979–1983, 2018, doi: 10.1109ICCT.2017.8359975.
2. Malware Detection Using Data Mining Techniques;Najari S.;Int. J. Intell. Inf. Syst.,2014
3. D. Jacobson and J. Idziorek, Computer security literacy: staying safe in a digital world, vol. 50, no. 10. 2013.
4. Machine learning in cybersecurity: a comprehensive survey
5. R. A. Katole, “Parameter Values of SQL Query,” 2018 2nd Int. Conf. Inven. Syst. Control, no. Icisc, pp. 736–741, 2018.