1. P. CISCO Report, “Cybersecurity Almanac:100 Facts, Figures and Statistics, “Report by cisco,” https://cybersecurityventures.com/cybersecurity-almanac-2019/, 2019 (accessed October 2020).
2. N. A. C. Accenture, “The cost of Cybercrime Study Report by accenture,” https://www.accenture.com/acnmedia/pdf-96/accenture-2019-cost-of-cybercrime-study-final.pdf, 2019 (accessed MARCH 6, 2020).
3. K. Kaspersky, “Malware Report by kaspersky,” https://go.kaspersky.com/rs/802-IJN-240/images/KSB 2019 Statistics EN.pdf, 2019 (accessed October 2020).
4. Cloudeyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (iot) devices;Sun;Software: Practice and Experience,2017
5. Behavior-based features model for malware detection;Galal;Journal of Computer Virology and Hacking Techniques,2016