1. Alam S, Horspool RN, Traore I, et al., 2015. A framework for metamorphic malware analysis and real-time detection. Comput Secur, 48:212–233. https://doi.org/10.1016/j.cose.2014.10.011
2. Alazab M, 2015. Profiling and classifying the behavior of malicious codes. J Syst Softw, 100:91–102. https://doi.org/10.1016/j.jss.2014.10.031
3. Alazab M, Venkataraman S, Watters P, 2010. Towards Understanding malware behaviour by the extraction of API calls. Proc 2nd Cybercrime and Trustworthy Computing Workshop, p.52–59. https://doi.org/10.1109/CTC.2010.8
4. Anderson B, Storlie C, Lane T, 2012. Improving malware classification: Bridging the static/dynamic gap. Proc 5th ACM Workshop on Security and Artificial Intelligence, p.3–14. https://doi.org/10.1145/2381896.2381900
5. Anderson B, Lane T, Hash C, 2014. Malware phylogenetics based on the multiview graphical lasso. Proc 13th Int Symposium on Advances in Intelligent Data Analysis XIII, p.1–12. https://doi.org/10.1007/978-3-319-12571-8_1