Camouflage in Malware: from Encryption to Metamorphism, In: International Journal of Computer Science & Network Security, 2012. ,
MAVMM: Lightweight and Purpose Built VMM for Malware Analysis, 2009 Annual Computer Security Applications Conference, 2009. ,
DOI : 10.1109/ACSAC.2009.48
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.207.1280
Byte Level n?Gram Analysis for Malware Detection, pp.51-59, 2011. ,
DyVSoR: Dynamic Malware Detection Based on Extracting Patterns fromValue Sets of Registers, In: The ISC International Journal of Information Security, 2013. ,
Malware detection based on structural and behavioural features of API calls, The Proceedings of the 1st International Cyber Resilience Conference, 2010. ,
Malware Detection Based on Hybrid Signature Behavior Application Programming Interface Call Graph, In: American Journal of Applied Sciences, 2012. ,