Automated Classification and Analysis of Internet Malware, pp.178-197, 2007. ,
DOI : 10.1007/978-3-540-74320-0_10
An Inside Look at Botnets, Malware Detection, Advances in Information Security, pp.171-191, 2007. ,
DOI : 10.1007/978-0-387-44599-1_8
Microsoft security intelligence report, 2006. ,
Samnani: Symantec global internet security threat report trends for, 2009. ,
Classification of malware based on integrated static and dynamic features, Journal of Network and Computer Applications, vol.36, issue.2, pp.646-656, 2013. ,
DOI : 10.1016/j.jnca.2012.10.004
A study of malware detection and classification by comparing extracted strings, Proceedings of the 5th International Confernece on Ubiquitous Information Management and Communication, ICUIMC '11, pp.1-75, 2011. ,
DOI : 10.1145/1968613.1968704
Mcafee threats report: Third quarter, 2009. ,
The WEKA Data Mining Software: An Update, SIGKDD Explorations, vol.11, issue.1, pp.10-18, 2009. ,
MEDUSA, Proceedings of the 3rd international conference on Security of information and networks, SIN '10, pp.263-269, 2010. ,
DOI : 10.1145/1854099.1854152
Trends in circumventing web-malware detection, Google Tech. Rep, 2011. ,
A discovery of sequential attack patterns of malware in botnets, 2010 IEEE International Conference on Systems, Man and Cybernetics, pp.2564-2570, 2010. ,
DOI : 10.1109/ICSMC.2010.5641914
Hybrid Analysis and Control of Malware, Proc. of the 13 th International Conference on Recent advances in intrusion detection, pp.317-338, 2010. ,
DOI : 10.1007/978-3-642-15512-3_17
Detecting Malware Outbreaks Using a Statistical Model of Blackhole Traffic, 2008 IEEE International Conference on Communications, pp.1593-1597, 2008. ,
DOI : 10.1109/ICC.2008.308
The Choice of a Class Interval, Journal of the American Statistical Association, vol.21, issue.153, pp.65-66, 1926. ,
DOI : 10.1080/01621459.1926.10502161
Commercial Antivirus Software Effectiveness: An Empirical Study, Computer, vol.44, issue.3, pp.63-70, 2011. ,
DOI : 10.1109/MC.2010.187
A New Approach to Malware Detection, Advances in Information Security and Assurance, pp.229-238, 2009. ,
DOI : 10.1007/11663812_11
Function length as a tool for malware classification, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE), pp.69-76, 2008. ,
DOI : 10.1109/MALWARE.2008.4690860
An automated classification system based on the strings of trojan and virus families, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE), pp.23-30, 2009. ,
DOI : 10.1109/MALWARE.2009.5403021
Differentiating malware from cleanware using behavioural analysis, 2010 5th International Conference on Malicious and Unwanted Software, p.2010, 2010. ,
DOI : 10.1109/MALWARE.2010.5665796
URL : http://dro.deakin.edu.au/eserv/DU:30033827/islam-MALWARE-evidence-2010.pdf
Investigation and analysis of malware on websites, 2010 12th IEEE International Symposium on Web Systems Evolution (WSE), pp.73-81, 2010. ,
DOI : 10.1109/WSE.2010.5623567
Malware Obfuscation Techniques: A Brief Survey, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, pp.297-300, 2010. ,
DOI : 10.1109/BWCCA.2010.85
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.452.9461