TY - STD TI - ASPack, http://www.aspack.com (2017) UR - http://www.aspack.com ID - ref1 ER - TY - JOUR AU - Bai, H. PY - 2014 DA - 2014// TI - Approach for malware identification using dynamic behaviour and outcome triggering JO - IET Inf Secur VL - 8 UR - https://doi.org/10.1049/iet-ifs.2012.0343 DO - 10.1049/iet-ifs.2012.0343 ID - Bai2014 ER - TY - CHAP AU - Calvet, J. PY - 2012 DA - 2012// TI - Aligot: Cryptographic Function Identification in Obfuscated Binary Programs BT - Proc. of ACM Conference on Computer and Communications Security ID - Calvet2012 ER - TY - STD TI - Canzanese R. et al. (2015) System call-based detection of malicious processes. In proc. of 2015 IEEE international conference on software quality, Reliability and Security, 119–24 ID - ref4 ER - TY - JOUR AU - Cesare, S. PY - 2014 DA - 2014// TI - Control flow-based malware variant detection JO - IEEE Trans Dependable and Secure Comput VL - 11 UR - https://doi.org/10.1109/TDSC.2013.40 DO - 10.1109/TDSC.2013.40 ID - Cesare2014 ER - TY - CHAP AU - Coogan, K. PY - 2009 DA - 2009// TI - Automatic Static Unpacking of Malware Binaries BT - Proc. of Working Conference on Reverse Engineering ID - Coogan2009 ER - TY - CHAP AU - Esmaily, J. PY - 2015 DA - 2015// TI - Intrusion detection system based on Multi-Layer Perceptron Neural Networks and Decision Tree BT - Proc. of IEEE Conference on Information and Knowledge Technology ID - Esmaily2015 ER - TY - STD TI - Euclidean Space, https://en.wikipedia.org/wiki/Euclidean_space (2017) UR - https://en.wikipedia.org/wiki/Euclidean_space ID - ref8 ER - TY - JOUR AU - Fernándezcaballero, A. PY - 2003 DA - 2003// TI - On motion detection through a multi-layer neural network architecture JO - Neural Netw VL - 16 UR - https://doi.org/10.1016/S0893-6080(02)00233-2 DO - 10.1016/S0893-6080(02)00233-2 ID - Fernándezcaballero2003 ER - TY - STD TI - Gradient descent, https://en.wikipedia.org/wiki/Gradient_descent (2017) UR - https://en.wikipedia.org/wiki/Gradient_descent ID - ref10 ER - TY - CHAP AU - Huang, J. PY - 2014 DA - 2014// TI - AsDroid detecting stealthy behaviors in Android applications by user interface and program behavior contradiction BT - Proc. of ACM/IEEE International Conference on Software Engineering ID - Huang2014 ER - TY - STD TI - Jang J et al (2015) Mal-Netminer: Malware Classification Approach Based on Social Network Analysis of System Call Graph. In: Proc. of the 23rd international conference on World wide web companion pp 731–34. ID - ref12 ER - TY - STD TI - Kolosnjaji B et al (2016) Deep Learning for Classication of Malware System Call Sequences. In: Proc. of Australasian Joint Conference on Artificial Intelligence pp 137–149 ID - ref13 ER - TY - JOUR AU - Konrad, R. PY - 2011 DA - 2011// TI - Automatic analysis of malware behavior using machine learning JO - J Comput Secur VL - 19 UR - https://doi.org/10.3233/JCS-2010-0410 DO - 10.3233/JCS-2010-0410 ID - Konrad2011 ER - TY - STD TI - Kullback-Leibler divergence, https://en.wikipedia.org/wiki/Kullback-Leibler_divergence (2018) UR - https://en.wikipedia.org/wiki/Kullback-Leibler_divergence ID - ref15 ER - TY - CHAP AU - Kumar, C. PY - 2012 DA - 2012// TI - Obfuscated Malware Detection Using API Call Dependency BT - Proc. Of ACM International Conference on Security of Internet of Things ID - Kumar2012 ER - TY - STD TI - Li Z. et al.: VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. In Proc. of arXiv:1801.01681v1 [cs.CR] (2018) ID - ref17 ER - TY - STD TI - Malwr, https://malwr.com/ (2018) UR - https://malwr.com ID - ref18 ER - TY - CHAP AU - Nataraj, L. PY - 2011 DA - 2011// TI - A Comparative Assessment of Malware Classification using Binary Texture Analysis and Dynamic Analysis BT - Proc. of ACM Workshop on Security & Artificial Intelligence ID - Nataraj2011 ER - TY - STD TI - PCA, https://en.wikipedia.org/wiki/Principal_component_analysis (2017) UR - https://en.wikipedia.org/wiki/Principal_component_analysis ID - ref20 ER - TY - JOUR AU - Peng, H. PY - 2005 DA - 2005// TI - Feature selection based on mutual information: criteria of max-dependency, max-relevance, and min-redundancy JO - IEEE Trans Pattern Anal Mach Intell VL - 27 UR - https://doi.org/10.1109/TPAMI.2005.159 DO - 10.1109/TPAMI.2005.159 ID - Peng2005 ER - TY - CHAP AU - Raman, K. PY - 2012 DA - 2012// TI - Selecting features to classify malware BT - InfoSec Southwest ID - Raman2012 ER - TY - STD TI - Receiver Operating Characteristic, https://en.wikipedia.org/wiki/Receiver_operating_characteristic (2018) UR - https://en.wikipedia.org/wiki/Receiver_operating_characteristic ID - ref23 ER - TY - CHAP AU - Royal, P. PY - 2006 DA - 2006// TI - PolyUnpack: Automating the Hidden-Code Extraction of Unpac Executing Malware BT - Proc. of 22nd Annual Computer Security Applications Conference ID - Royal2006 ER - TY - CHAP AU - Salai Selvam, V. PY - 2011 DA - 2011// TI - Brain tumor detection using scalp eeg with modified Wavelet-ICA and multi layer feed forward neural network BT - Proc. of Annual International Conference of the IEEE Engineering in Medicine and Biology Society ID - Salai Selvam2011 ER - TY - CHAP AU - Salcedo Parra, O. PY - 2014 DA - 2014// TI - Traffic forecasting using a multi layer perceptron model BT - Proc. of ACM symposium on QoS and security for wireless and mobile networks ID - Salcedo Parra2014 ER - TY - JOUR AU - Santos, I. PY - 2011 DA - 2011// TI - Opcode sequences as representation of executables for data mining based malware variant detection JO - Inf Sci VL - 231 ID - Santos2011 ER - TY - CHAP AU - Santos, I. PY - 2013 DA - 2013// TI - OPEM: A Static-Dynamic Approach for Machine Learning Base Malware Detection BT - Proc. of International Conference CISIS’12 ID - Santos2013 ER - TY - CHAP AU - Shehu, Z. PY - 2016 DA - 2016// TI - Towards the Usage of Invariant-Based App Behavioral Fingerprinting for the Detection of Obfuscated Versions of Known Malware BT - Proc. of IEEE International Conference on Next Generation Mobile Applications, Security and Technologies ID - Shehu2016 ER - TY - JOUR AU - Suarez-Tangil, G. PY - 2016 DA - 2016// TI - ALTERDROID: differential fault analysis of obfuscated smart-phone malware JO - IEEE Trans Mob Comput VL - 15 ID - Suarez-Tangil2016 ER - TY - CHAP AU - Treadwell, S. PY - 2009 DA - 2009// TI - A Heuristic Approach for Detection of Obfuscated Malware BT - Proc. of IEEE International Conference on Intelligence & Security Informatics ID - Treadwell2009 ER - TY - STD TI - UPX, https://upx.github.io (2017) UR - https://upx.github.io ID - ref32 ER - TY - STD TI - VMProtect, https://vmpsoft.com/products/vmprotect/ (2017) UR - https://vmpsoft.com/products/vmprotect/ ID - ref33 ER - TY - STD TI - VX Heaven, https://hypestat.com/info/vxheaven.org (2017) UR - https://hypestat.com/info/vxheaven.org ID - ref34 ER - TY - CHAP AU - Xu, L. PY - 2016 DA - 2016// TI - Dynamic Android Malware Classification Using Graph-Based Representations BT - Proc. of IEEE International Conference on Cyber Security and Cloud Computing ID - Xu2016 ER - TY - STD TI - W. Yang et al. (2015) AppContext: differentiating malicious and benign mobile app behaviors using context. In: Proc. of IEEE/ACM International Conference on Software Engineering (2015), Firenze, Italy, pp 303–313 ID - ref36 ER - TY - CHAP AU - Zhang, J. PY - 2016 DA - 2016// TI - Malware Variant Detection Using Opcode Image Recognition with Small Training Sets BT - Proc. of IEEE International Conference on Computer Communication and Networks ID - Zhang2016 ER - TY - CHAP AU - Zhang, J. PY - 2016 DA - 2016// TI - IRMD: Malware Variant Detection Using Opcode Image Recognition BT - Proc. of IEEE International Conference on Parallel and Distributed Systems ID - Zhang2016 ER - TY - JOUR AU - Zhang, H. PY - 2016 DA - 2016// TI - Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery JO - ACM Transactions on Privacy and Security VL - 19 ID - Zhang2016 ER - TY - STD TI - ZProtect, https://tuts4you.com/download.php?view.3017 (2017) UR - https://tuts4you.com/download.php?view.3017 ID - ref40 ER -