M. Bailey, J. Oberheide, J. Andersen, Z. Mao, F. Jahanian et al., Automated Classification and Analysis of Internet Malware, pp.178-197, 2007.
DOI : 10.1007/978-3-540-74320-0_10

P. Barford and V. Yegneswaran, An Inside Look at Botnets, Malware Detection, Advances in Information Security, pp.171-191, 2007.
DOI : 10.1007/978-0-387-44599-1_8

M. Braverman, J. Williams, and Z. Mador, Microsoft security intelligence report, 2006.

M. Fossi, E. Johnson, T. Mack, D. Turner, J. Blackbird et al., Samnani: Symantec global internet security threat report trends for, 2009.

R. Islam, R. Tian, L. M. Batten, and S. Versteeg, Classification of malware based on integrated static and dynamic features, Journal of Network and Computer Applications, vol.36, issue.2, pp.646-656, 2013.
DOI : 10.1016/j.jnca.2012.10.004

J. Lee, C. Im, and H. Jeong, A study of malware detection and classification by comparing extracted strings, Proceedings of the 5th International Confernece on Ubiquitous Information Management and Communication, ICUIMC '11, pp.1-75, 2011.
DOI : 10.1145/1968613.1968704

D. Marcus, P. Greve, S. Masiello, and D. Scharoun, Mcafee threats report: Third quarter, 2009.

H. Mark, F. Eibe, H. Geoffrey, P. Bernhard, R. Peter et al., The WEKA Data Mining Software: An Update, SIGKDD Explorations, vol.11, issue.1, pp.10-18, 2009.

V. P. Nair, H. Jain, Y. K. Golecha, M. S. Gaur, and V. Laxmi, MEDUSA, Proceedings of the 3rd international conference on Security of information and networks, SIN '10, pp.263-269, 2010.
DOI : 10.1145/1854099.1854152

M. Rajab, L. Ballard, N. Jagpal, P. Mavrommatis, D. Nojiri et al., Trends in circumventing web-malware detection, Google Tech. Rep, 2011.

N. R. Rosyid, M. Ohrui, H. Kikuchi, P. Sooraksa, and M. Terada, A discovery of sequential attack patterns of malware in botnets, 2010 IEEE International Conference on Systems, Man and Cybernetics, pp.2564-2570, 2010.
DOI : 10.1109/ICSMC.2010.5641914

K. A. Roundy and B. P. Miller, Hybrid Analysis and Control of Malware, Proc. of the 13 th International Conference on Recent advances in intrusion detection, pp.317-338, 2010.
DOI : 10.1007/978-3-642-15512-3_17

S. Soltani, S. A. Khayam, and H. Radha, Detecting Malware Outbreaks Using a Statistical Model of Blackhole Traffic, 2008 IEEE International Conference on Communications, pp.1593-1597, 2008.
DOI : 10.1109/ICC.2008.308

H. A. Sturges, The Choice of a Class Interval, Journal of the American Statistical Association, vol.21, issue.153, pp.65-66, 1926.
DOI : 10.1080/01621459.1926.10502161

O. Sukwong, H. Kim, and J. Hoe, Commercial Antivirus Software Effectiveness: An Empirical Study, Computer, vol.44, issue.3, pp.63-70, 2011.
DOI : 10.1109/MC.2010.187

H. Tang, B. Zhu, and K. Ren, A New Approach to Malware Detection, Advances in Information Security and Assurance, pp.229-238, 2009.
DOI : 10.1007/11663812_11

R. Tian, L. M. Batten, and S. C. Versteeg, Function length as a tool for malware classification, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE), pp.69-76, 2008.
DOI : 10.1109/MALWARE.2008.4690860

R. Tian, L. Batten, R. Islam, and S. Versteeg, An automated classification system based on the strings of trojan and virus families, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE), pp.23-30, 2009.
DOI : 10.1109/MALWARE.2009.5403021

R. Tian, R. Islam, L. Batten, and S. Versteeg, Differentiating malware from cleanware using behavioural analysis, 2010 5th International Conference on Malicious and Unwanted Software, p.2010, 2010.
DOI : 10.1109/MALWARE.2010.5665796

URL : http://dro.deakin.edu.au/eserv/DU:30033827/islam-MALWARE-evidence-2010.pdf

T. Yagi, N. Tanimoto, T. Hariu, and M. Itoh, Investigation and analysis of malware on websites, 2010 12th IEEE International Symposium on Web Systems Evolution (WSE), pp.73-81, 2010.
DOI : 10.1109/WSE.2010.5623567

I. You and K. Yim, Malware Obfuscation Techniques: A Brief Survey, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, pp.297-300, 2010.
DOI : 10.1109/BWCCA.2010.85

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.452.9461