· VirvilisNikos, and Dimitris Gritzalis. "The big four-what we did wrong in advanced persistent threat detection?." Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. IEEE, 2013.
· Neda AfzaliSeresht, Reza Azmi, "MAIS-IDS: A distributed intrusion detection system using multi-agent AIS approach", Engineering Applications of Artificial Intelligence, Vol. 35, pp.286-298
· Hung-Jen Liao, Chun-Hung Richard Lin, Ying-ChihLin, Kuang-Yuan Tung, "Intrusion detection system: A comprehensive", Journal of Network and Computer Applications, Vol.36, Iss.1, pp.16-24, 2013
· Nicolas Falliere, Liam O Murchu, and Eric Chien, "W32.Stuxnet Dossier Version 1.4 (February 2011)", Symantec Corporation, 2011
· BoldizsárBencsáth, GáborPék, LeventeButtyán, MárkFélegyházi, " Duqu: Analysis, detection, and lessons learned." ACM European Workshop on System Security (EuroSec). Vol. 2012. 2012
· "The ‘Red October’ Campaign—An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies", (14 Jan 2013), GReAT, Kaspersky Lab
· "CARBANAK APT THE GREAT BANK ROBBERY”, Version 2.1, February 2015, Kaspersky lab
· Chirag Modi, DhirenPatel, BhaveshBorisaniya, Hiren Patel, AviPatel, MuttukrishnanRajarajan, “A survey of intrusion detection techniques in Cloud”, Journal of Network and Computer Applications, vol.36, iss.1, pp.42-57, 2013
· NirNissim, Robert Moskovitch, LiorRokach, Yuval Elovici, “Novel active learning methods for enhanced PC malware detection in windows OS”, Expert Systems with Applications, vol.41, iss.13, pp.5843-5857, 2014
· ShahidAlam, R.NigelHorspool, IssaTraore, Ibrahim Sogukpinar, "A framework for metamorphic malware analysis and real-time detection", Computers&Security, Vol.48, pp.212-233, 2015
· Aziz Mohaisen, Omar Alrawi, ManarMohaisen, "Amal: High-fidelity, behavior-based automated malware analysis and classification", Computer&Security, pp.1-16, 2015
· Ping Wang, Yu-Shih Wang, "Malware behaviouraldetection and vaccine development by using a support vector model classifier", Journal of Computer and System Sciences, Vol. 81, Iss . 6, pp.1012-1026, 2015
· Ammar Ahmed E. Elhadi, MohdAizainiMaarof, BazaraI.A. Barry, HentabliHamza, "Enhancing the detection of metamorphic malware using call graphs" Computers&Security, Vol 46, pp.62-78, 2014
· LIU Wu, REN Ping, LIU Ke, DUAN Hai-xin, "Behavior-based Malware Analysis and Detection", 2011 First International Workshop on Complexity and Data Mining, pp.39-42, 2011
· 김태근, 임을규, “악성코드변종 탐지를 위한 코드 재사용 분석 기법”, 정보보호학회지, Vol.24, Iss.1, pp32-38, 2014
· NirNissim, Robert Moskovitch, LiorRokach, Yuval Elovici, “Novel active learning methods for enhanced PC malware detection in windows OS”, Expert Systems with Applications, Vol.41, pp.5843-5857, 2014
· JnanamurthyHK, Chirag Warty, Sanjay Singh, “Threat Analysis and Malicious User Detection in Reputation Systems using Mean Bisector Analysis and Cosine Similarity (MBACS)”, Annual IEEE India Conference (INDICON), 2013
· BALDANGOMBO, Usukhbayar; JAMBALJAV, Nyamjav; HORNG, Shi-Jinn. “A static malware detection system using data mining methods”. cornelluniversity library, arXivpreprint arXiv:1308.2831, 2013.27