1. Pandey, A.K., Tripathi, A.K., Kapil, G., Singh, V., Khan, M.W., Agrawal, A., Kumar, R., and Khan, R.A. (2020). Critical Concepts, Standards, and Techniques in Cyber Forensics, IGI Global.
2. Schultz, M.G., Eskin, E., Zadok, F., and Stolfo, S.J. (2000, January 14–16). Data mining methods for detection of new malicious executables. Proceedings of the Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, Oakland, CA, USA.
3. Learning to detect and classify malicious executables in the wild;Kolter;J. Mach. Learn. Res.,2006
4. Raff, E., Barker, J., Sylvester, J., Brandon, R., Catanzaro, B., and Nicholas, C.K. (2018, January 2–7). Malware detection by eating a whole exe. Proceedings of the Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence, New Orleans, LA, USA.
5. Anderson, H.S., and Roth, P. (2022, December 08). elastic/ember. Available online: https://github.com/elastic/ember/blob/master/README.md.