- P. M. Comparetti, G. Salvaneschi, E. Kirda, C. Kolbitsch, C. Kruegel, and S. Zanero, “Identifying Dormant Functionality in Malware Programs,” in IEEE Symposium on Security and Privacy, 2010.##
- N. R. Veeramani R, “Windows API based Malware Detection and Framework Analysis,” International conference on networks and cyber security, 2012##.
- C. Raymond, S. Mancoridis, and M. Kam, “System Call-based Detection of Malicious Processes,” in IEEE International Conference on Software Quality, Reliability and Security, 2015.##
- S. Naval, V. Laxmi, N. Gupta, M. Singh Gaur, and M. Rajarajan, “Exploring Worm Behaviors using DTW,” in Proceedings of the 7th International Conference on Security of Information and Networks, 2014.##
- T. Barhoom and H. Qeshta, “Worm Detection by Combination of Classification with neural networks,” in international Arab Journal of e-Technology, 2013##.
- D. Kharche and A. Thakare, “Internet Worm Classification and Detection using Data Mining techniques,” in IOSR Journal of Computer Engineering (IOSR- JCE), 2015.##
- S. C. Jeeva and E. Blessing Rajsingh, “Intelligent phishing url detection using association rule mining,” in Human-centric Computing and Information Sciences, 2016.##
- Y. Wang, B. Watson, J. Zheng, and S. Mukkamala, “ARP-Miner: Mining Risk Patterns of Android Malware,” International Workshop on Multi-disciplinary Trends in Artificial Intelligence, pp. 363-375, 2015.##
- S. Palahan, D. Babić, S. Chaudhuri, and D. Kifer, “Extraction of Statistically Significant Malware Behaviors,” in Proceedings of the 29th Annual Computer Security Applications Conference, 2013##.
- Y. Tang, J. Luo, B. Xiao, and G. Wei, “Concept, characteristics and defending mechanism of worms,” in IEICE transactions on Information and Systems, 2009##.
- M. Norouzi, A. Souri, and M. Samad Zamini, “A Data Mining Classification Approach for Behavioral Malware Detection,” Journal of Computer Networks and Communications, 2016.##
2. Y. Ye, T. Li, K. Huang, Q. Jiang, and Y. Chen, “Hierarchical associative classifier (HAC) for malware,” Journal of Intelligent Information Systems, vol. 35, no. 1, pp. 1-20, 2010.##