References
- G. Bala Krishna, V. Radha, K. Venugopala Rao, "Review of Contemporary Literature on Machine Learning based Malware Analysis and Detection Strategies," Global Journal of Computer Science and Technology, vol. 16, Issue. 5, version 1.0, pp 11-16, 2016.
- B. Kolosnjaji, A. Zarras, G. Webster, C. Eckert, "Deep Learning for Classification of Malware System Call sequences," in Australasian Joint Conference on Artificial Intelligence, pp 137-149, 2016.
- Z. Bu et al., McAfee Threats Report: Second Quarter 2012, McAfee Labs, 2012.
- Ye, Yanfang, et al. "A Survey on Malware Detection Using Data Mining Techniques," ACM Computing Surveys (CSUR) vol.50,no.3, 41p, 2017. DOI: http://doi.org/10.1145/3073559
- analysis method, https://software.intel.com/
- Seung-Won Lee, Reversing Important Principles: Malware analyst's reversing talk, Insight, pp 141-143, 2012.
- I. Santos, F. Brezo, X. Ugarte-Pedrero, PG. Bringas, "Opcode Sequences as Representation of Executables for data-mining-based unknown malware detection," Information Sciences, vol. 231, pp. 64-82, 2013. DOI: http://doi.org/10.1016/j.ins.2011.08.020
- M. Alazab, R. Layton, S. Venkataraman, P. Watters, "Malware detection based on structural and behavioural features of api calls", School of Computer and Information Science, Security Research Centre, Edith Cowan University, Perth, Western Australia, 2010.
- M. Alazab, S. Venkatraman, P. Watters, M. Alazab, "Zero-day malware detection based on supervised learning algorithms of API call signatures", Proceedings of the Ninth Australasian Data Mining Conference-Volume 121, pp. 171-182, 2011.
- Jeong-been Park, Kyoung-Soo Han, Eul-Gyu Im, "Malware Classification Using Worth Opcodes," Proceedings of the Korea Information Science 2014 Korea Computer Conference, pp943-945, Jun, 2014.
- Yu-Jin Shim, Eul-Gyu Im, "Malware Detection And Classification System based on API Call Sequence," Ph.D. Thesis. University of Hanyang, Seoul, Republic of Korea 2016.
- Python Library, scikit-learn, Bernoulli naive bayes, http://scikit-learn.org/stable/modules/naive_bayes.html.
- Galit Shmueli, Nitin R. Patel, Peter C. Bruce, Data Mining for Business Intelligence, E&Bplus, pp 166, 2006.
- Kwon, Y. M., Lee, I. R., Kim, M. G., "A Study on Clustering of SNS SPAM using Heuristic Method", The Journal of The Institute of Internet, Broadcasting and Communication, 14.6, pp 7-12, 2014 DOI: http://doi.org/10.7236/JIIBC.2014.14.6.7
- E. Carrera, Pefile, https://github.com/erocarrera/pefile.
- Capstone, capstone, http://www.capstone-engine.org.
- virusshare, https://virusshare.com.
- joxeankoret, http://malwareurls.joxeankoret.com.
- malc0de, http://malc0de.com.
- malwareblacklist, http://www.malwareblacklist.com.