T. Hoppe, R. Merkel, C. Krätzer, and J. , Dittmann:StatistischeSchadcodedetektioninausführba renDateien, 2009.

I. H. Witten and E. Frank, Data mining, ACM SIGMOD Record, vol.31, issue.1, 2005.
DOI : 10.1145/507338.507355

F. Cohen, ComputerVirusesTheoryandExperiments, 1984.

P. Szor, TheArtofComputerVirusResearchandDefense, 2005.

E. Skoudis and L. Zeltser, Malware:FightingMaliciousCode " ,2nded Mian Zhou: A heuristic approach for detection of obfuscated malware, Pro ceedingsofthe2009IEEEISI, p.291299, 2004.

C. Borgelt, H. Timm, and . Kruse, Probabilisticnetworksandfuzzyclusteringasgenerali zationsofnaïvebayesclassifiers, InComputationalIntelligenceinTheoryandPractice,B. ReuschandK.H.Temme, 2001.

R. Quinlan, C4.5: Programs for Machine Learning, 1993.

Y. Freund and R. E. , Schapire: Experiments with a new boosting algorithm, Proc Interna tionalConferenceonMachineLearning, 1996.