References
- Rebecca Bacel and Peter Mell, 'Intrusion Detection Systems', NIST, 2003
- Carl Endorf, Eugene Schultz, Jim Mellander, 'Intrusion Detection & Prevention', McGraw-Hill, 2004
- H. Debar, M. Dacie, and A. Wepsi, 'A Revised Taxonomy for Intrusion- Detection Systems', IBM Report, 1999
- F.Apap, A. Honnig, S.Hershkop, E.Eskin, and S.Stolfo. Detecting malicious software by monitoring anomalous windows registry accesses. Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID 2002), 2002
- Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, and Salvatore J. Stolfo. An Email Worm Vaccine Architecture. Proceeding of the First Information Security Practice and Experience( ISPEC 2005), 2005
- Apap, F., Honkg, A., Hershkop, S., Eskin, E., Stolfo, S.J : Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. In: Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection(RAID). 2002
- Carsten Willems, Thorsten Holz, and Felix Freiling, : Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Security & Privacy. 2007
- Norman Sandbox, http://www.norman.com/Product/Sandbox-products/en
- CWSandbox, http://www.cwsandbox.org
- Sunbelt CWSandbox, http://www.sunbelt-software.com/Developer/Sunbelt-CWSandbox/
- TTAnalyze, http://www.ikarus.at/
- TTAnalyze, http://fabrice.bellard.free.fr/qemu/
- TTAnalyze, http://www.tuwien.ac.at/