D. Aucsmith, Tamper?resistant software: An implementation. Lecture Notes in Computer Science: Information Hiding: First International Workshop 1174, pp.317-333, 1996.
DOI : 10.1007/3-540-61996-8_49

M. Bailey, J. Andersen, Z. Morleymao, and F. Jahanian, Automated Classification and Analysis of Internet Malware, Proceedings of Recent Advances in Intrusion Detection, 2007.
DOI : 10.1007/978-3-540-74320-0_10

P. Berezi´nskiberezi´nski, M. Szpyrka, B. Jasiul, and M. Mazur, Network anomaly detection using parameterized entropy, Computer Information Systems and Industrial Management Proceedings of the 13th IFIP TC8 International Conference CISIM 2014, 2014.

G. Bonfante, M. Kaczmarek, and J. Y. Marion, A Classification of Viruses Through Recursion Theorems, Proceedings of the 3rd conference on Computability in Europe: Computation and Logic in the Real World, CiE '07, pp.73-82, 2007.
DOI : 10.1007/978-3-540-73001-9_8

URL : https://hal.archives-ouvertes.fr/inria-00175301

J. M. Borello and L. Mé, Code obfuscation techniques for metamorphic viruses, Journal in Computer Virology, vol.49, issue.1, pp.211-220, 2008.
DOI : 10.1007/s11416-008-0084-2

URL : https://hal.archives-ouvertes.fr/hal-00353061

J. Cappaert, B. Preneel, B. Anckaert, M. Madou, and K. De-bosschere, Towards Tamper Resistant Code Encryption: Practice and Experience, Proceedings of the 4th int. conf. on Information security practice and experience, ISPEC'08, pp.86-100, 2008.
DOI : 10.1007/978-3-540-79104-1_7

URL : https://lirias.kuleuven.be/bitstream/123456789/228612/2/article-1026.pdf

M. Christodorescu, S. Jha, and C. Kruegel, Mining specifications of malicious behavior, Proc. of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Int. Symposium on Foundations of Software Engineering, pp.5-14, 2007.

M. Christodorescu, S. Jha, S. Seshia, D. Song, and R. Bryant, Semantics-Aware Malware Detection, 2005 IEEE Symposium on Security and Privacy (S&P'05), pp.32-46, 2005.
DOI : 10.1109/SP.2005.20

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.3399

H. Flake, Structural comparison of executable objects, Proc. of the IEEE Conference on Detection of Intrusions and Malware & Vulnerability Assessment, pp.161-173, 2004.

L. Healy, A model to study cyber attack mechanics and denial-of-service exploits over the internet's router infrastructure using Colored Petri Nets Masters Theses and Doctoral Dissertations. 11, Tech. rep, vol.218, 2009.

K. Jensen and L. Kristensen, Coloured Petri Nets: Modelling and Validation of Concurrent Systems, 2009.
DOI : 10.1007/s10009-007-0038-x

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.8898

E. Kirda, C. Kruegel, G. Banks, G. Vigna, and R. Kemmerer, Behavior-based spyware detection, Usenix Security Symposium, 2006.

J. Kolter and M. Maloof, Learning to detect and classify malicious executables in the wild, Journal of Machine Learning Research, vol.7, pp.2721-2744, 2006.

C. Kruegel, W. Robertson, and G. Vigna, Detecting Kernel-Level Rootkits Through Binary Analysis, 20th Annual Computer Security Applications Conference, 2004.
DOI : 10.1109/CSAC.2004.19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.3205

S. Kumar and E. Spafford, A Pattern Matching Model for Misuse Intrusion Detection Computer Science Technical Reports, Tech. rep, vol.1170, 1994.

T. Lee and J. Mody, Behavioral classification, Proceedings of EICAR Conference, 2006.

C. Linn and S. Debray, Obfuscation of executable code to improve resistance to static disassembly, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, pp.290-299, 2003.
DOI : 10.1145/948109.948149

A. Moser, C. Kruegel, and E. Kirda, Limits of Static Analysis for Malware Detection, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), 2007.
DOI : 10.1109/ACSAC.2007.21

G. Nalepa and S. Bobek, Rule-based solution for context-aware reasoning on mobile devices, Computer Science and Information Systems, vol.11, issue.1, pp.171-193, 2014.
DOI : 10.2298/CSIS130209002N

URL : http://doi.org/10.2298/csis130209002n

G. Nalepa and A. Lig?-eza, Designing Reliable Web Security Systems Using Rule-Based Systems Approach, Advances in Web Intelligence. First International Atlantic Web Intelligence Conference AWIC 2003, pp.124-133, 2003.
DOI : 10.1007/3-540-44831-4_14

B. Rad, M. Masrom, and S. Ibrahim, Camouflage in malware: from encryption to metamorphism, In: Int. Journal of Computer Science and Network Security, vol.12, pp.74-83, 2012.

K. Rieck, T. Holz, C. Willems, and P. Düssel, Learning and Classification of Malware Behavior, Fifth Conf. on Detection of Intrusions and Malware & Vulnerability Assessment, 2008.
DOI : 10.1007/978-3-540-70542-0_6

M. Sharif, V. Yegneswaran, H. Saidi, P. Porras, W. Lee et al., Eureka: A framework for enabling static malware analysis IOEM ? Ontology engineering methodology for large systems Efficiency of dynamic content adaptation based on semantic description of web service call context, Proceedings of the 13th European Symposium on Research in Computer Security, ESORICS '08 Computational Collective Intelligence. Technologies and Applications Proceedings -IEEE Military Communications Conference MILCOM 2012, pp.481-500, 2008.

P. Szor, The Art of Computer Virus Research and Defense, 2005.

M. Szpyrka, B. Jasiul, K. Wrona, and F. Dziedzic, Telecommunications Networks Risk Assessment with Bayesian Networks, Computer Information Systems and Industrial Management Proceedings of the 12th IFIP TC8 International Conference CISIM 2013, pp.277-288, 2013.
DOI : 10.1007/978-3-642-40925-7_26

URL : https://hal.archives-ouvertes.fr/hal-01496074

M. Szpyrka and T. Szmuc, Decision Tables in Petri Net Models, Rough Sets and Intelligent Systems Paradigms, pp.648-657, 2007.
DOI : 10.1007/978-3-540-73451-2_68

P. Szwed and P. Skrzy´nskiskrzy´nski, A new lightweight method for security risk assessment based on fuzzy cognitive maps, International Journal of Applied Mathematics and Computer Science, vol.24, issue.1, pp.213-225, 2014.
DOI : 10.2478/amcs-2014-0016

URL : http://doi.org/10.2478/amcs-2014-0016

Z. Tarapata, M. Chmielewski, and R. Kasprzyk, An Algorithmic Approach to Social Knowledge Processing and Reasoning Based on Graph Representation ??? A Case Study, Proceedings of the Second International Conference on Intelligent Information and Database Systems, pp.93-104, 2010.
DOI : 10.1007/978-3-642-12101-2_11

A. Tokhtabayev, V. Skormin, and A. Dolgikh, Dynamic, resilient detection of complex malicious functionalities in the system call domain, 2010, MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, pp.1349-1356, 2010.
DOI : 10.1109/MILCOM.2010.5680136