1. Annachhatre, C., Austin, T.H., Stamp, M., 2015. Hidden Markov models for malware classification. J. Comput. Virol. Hack. Tech., 11(2):59–73. https://doi.org/10.1007/s11416-014-0215-x
2. Cheng, J.Y.C., Tsai, T.S., Yang, C.S., 2013. An information retrieval approach for malware classification based on Windows API calls. Int. Conf. on Machine Learning and Cybernetics, p.1678–1683. https://doi.org/10.1109/ICMLC.2013.6890868
3. Damodaran, A., di Troia, F., Visaggio, C.A., et al., 2017. A comparison of static, dynamic, and hybrid analysis for malware detection. J. Comput. Virol. Hack. Tech., 13(1): 1–12. https://doi.org/10.1007/s11416-015-0261-z
4. Ding, Y.X., Dai, W., Yan, S.L., et al., 2014. Control flowbased Opcode behavior analysis for malware detection. Comput. Secur., 44:65–74. https://doi.org/10.1016/j.cose.2014.04.003
5. Egele, M., Scholte, T., Kirda, E., et al., 2012. A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv., 44(2): Article 6. https://doi.org/10.1145/2089125.2089126