1. N-GRAMS-BASED FILE SIGNATURES FOR MALWARE DETECTION
2. Effective and Efficient Malware Detection at the End Host;Kolbitsch,2009
3. Symantec, “https://www.symantec.com/security_response/publications/,” January 2014. [Online]. Available: http://www.symantec.com/content/en/us/enterprise/other_resources/b-intelligence_report_01-2014.en-us.pdf). [Accessed 31 March 2014].
4. Taxonomy of Anomaly Based Intrusion Detection System: A Review;Gyanchandani,2012
5. Guide to Intrusion Detectin and Prevention Systems (IDPS);Scarfone,2007