1. [1] K. Baumgartner, “Sony/Destover: Mystery North Korean actor's destructive and past network activity,” https://securelist.com/blog/research/67985/destover/
2. [2] D. Canali, A. Lanzi, D. Balzarotti, C. Kruegel, M. Christodorescu, and E. Kirda, “A quantitative study of accuracy in system call-based malware detection,” Proc. 2012 International Symposium on Software Testing and Analysis, ISSTA 2012, pp.122-1132, 2012.
3. [3] P.M. Comparetti, G. Salvaneschi, E. Kirda, C. Kolbitsch, C. Kruegel, and S. Zanero, “Identifying dormant functionality in malware programs,” 2010 IEEE Symposium on Security and Privacy, pp.61-76, 2010.
4. [4] T. Hayashi, Y. Yamaguchi, H. Shimada, and H. Takakura, “Network behavior-based malware classification method based on sequence pattern of traffic flow,” CSS'14, 2014 (in Japanese).
5. [5] Y. Higashi, Studies on malware classification by the function based on the malware's code, Master's Thesis, Nara Institute of Science and Technology, 2011 (in Japanese).