References
- G Bala Krishna, V Radha, K Venugopala Rao, "Review of Contemporary Literature on Machine Learning based Malware Analysis and Detection Strategies," Global Journal of Computer Science and Technology, vol. 16, Issue. 5, version 1.0, pp 11-16, 2016.
- B Kolosnjaji, A Zarras, G Webster, C Eckert, "Deep Learning for Classification of Malware System Call sequences," in Australasian Joint Conference on Artificial Intelligence, pp 137-149, 2016.
- Z. Bu et al., McAfee Threats Report: Second Quarter 2012, McAfee Labs, 2012.
- Ga-Young Bae et al., "Applying Machine Learning Algorithm to Method for Detecting Malware Using Opcode", Journal of Korea Information and Communications Society Summer Conference 2016, Vol.60, pp1327-1328, 2016.
- Seung-Won Lee, Reversing Important Principles: Malware analyst's reversing talk, Insight, pp 141-143, 2012.
- Ye, Yanfang, et al. "A Survey on Malware Detection Using Data Mining Techniques," ACM Computing Surveys (CSUR) vol.50, no.3, 41p, 2017.
- Jeong-been Park, Kyoung-Soo Han, Eul-Gyu Im, "Malware Classification Using Worth Opcodes," Proceedings of the Korea Information Science 2014 Korea Computer Conference, pp943-945, Jun, 2014.
- R. Swinburne, "Bayes' Theorem," Philosophical Review of France and the Foreigner, vol. 194, no. 2, pp250-251, 2004.
- Python Library, scikit-learn, Bernoulli naive bayes, http://scikit-learn.org/stable/modules/naive_bayes.html.
- Tong, Simon, and Daphne Koller. "Support vector machine active learning with applications to text classification." Journal of machine learning research, pp 45-66, Nov 2001.
- Han, Eui-Hong Sam, George Karypis, and Vipin Kumar. "Text categorization using weight adjusted k-nearest neighbor classification." Pacific-asia conference on knowledge discovery and data mining. Springer, Berlin, Heidelberg, 2001.
- Safavian, S. Rasoul, and David Landgrebe. "A survey of decision tree classifier methodology." IEEE transactions on systems, man, and cybernetics Vol. 21. No. 3 pp. 660-674, 1991 https://doi.org/10.1109/21.97458
- E. Carrera, Pefile, https://github.com/erocarrera/pefile.
- Capstone, capstone, http://www.capstone-engine.org.
- virusshare, https://virusshare.com.
- joxeankoret, http://malwareurls.joxeankoret.com.
- malc0de, http://malc0de.com.
- malwareblacklist, http://www.malwareblacklist.com.
- Hanley, James A., and Barbara J. McNeil. "The meaning and use of the area under a receiver operating characteristic (ROC) curve." Radiology Vol. 143, No.1 pp 29-36. 1982. https://doi.org/10.1148/radiology.143.1.7063747
- Tae-Hyun Ahn, Sang-Jin Oh, Young-Man Kwon, "Malware Detection Method using Opcode and windows API Calls", The Journal of The Institute of Internet, Broadcasting and Communication, Vol. 17, No. 6, pp. 11-17, Dec 2017. DOI: https://doi.org/10.7236/JIIBC.2017.17.6.11