1. A Survey on Malware Detection Using Data Mining Techniques
2. Intrusion detection using sequences of system calls
3. Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, and Thomas A. Longstaff. 1996. A Sense of Self for Unix Processes. In Proceedings of the 1996 IEEE Symposium on Security and Privacy (SP '96). IEEE Computer Society, USA, 120.
4. Hoang, Dau & Hu, Jiankun & Bertok, P. 2003. A multi-layer model for anomaly intrusion detection using program sequences of system calls. International Conference on Network - ICON2003. 531- 536. 10.1109/ICON.2003.1266245.
5. Learning classifiers for misuse and anomaly detection using a bag of system calls representation[C]//Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop;Kang D K;IEEE,2005