B. Rad, M. Bashari, S. Masrom, and . Ibrahim, Camouflage in Malware: from Encryption to Metamorphism, In: International Journal of Computer Science & Network Security, 2012.

A. M. Nguyen, N. Schear, H. Jung, A. Godiyal, S. T. King et al., MAVMM: Lightweight and Purpose Built VMM for Malware Analysis, 2009 Annual Computer Security Applications Conference, 2009.
DOI : 10.1109/ACSAC.2009.48

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.207.1280

J. Sachin and Y. Kumar-meena, Byte Level n?Gram Analysis for Malware Detection, pp.51-59, 2011.

M. Ghiasi, A. Sami, and Z. Salehi, DyVSoR: Dynamic Malware Detection Based on Extracting Patterns fromValue Sets of Registers, In: The ISC International Journal of Information Security, 2013.

M. Alazab, R. Layton, S. Venkataraman, and P. Watters, Malware detection based on structural and behavioural features of API calls, The Proceedings of the 1st International Cyber Resilience Conference, 2010.

A. Elhadi, E. Ahmed, A. Mohd-aizaini-maarof, and . Osman, Malware Detection Based on Hybrid Signature Behavior Application Programming Interface Call Graph, In: American Journal of Applied Sciences, 2012.