A. Fedorchenko, I. Kotenko, and A. Chechulin, Integrated Repository of Security Information for Network Security Evaluation, JoWUA, vol.6, issue.2, pp.41-57, 2015.

R. K. Shahzad and N. Lavesson, Comparative Analysis of Voting Schemes for Ensemble-based Malware Detection, JoWUA, vol.4, issue.1, pp.98-117, 2013.

A. Skovoroda and D. Gamayunov, Securing mobile devices: malware mitigation methods, JoWUA, vol.6, issue.2, pp.78-97, 2015.

Y. Zhan, J. Yin, and X. Liu, A Convergent Solution to Matrix Bidirectional Projection Based Feature Extraction with Application to Face Recognition, International Journal of Computational Intelligence Systems, vol.4, issue.5, pp.863-873, 2011.
DOI : 10.1080/18756891.2011.9727837

C. Bohm, Searching in high-dimensional spaces: Index structures for improving the performance of multimedia databases, ACM Computing Surveys, vol.33, issue.3, pp.322-373, 2001.
DOI : 10.1145/502807.502809

R. Zhang, B. C. Ooi, and K. L. Tan, Making the pyramid technique robust to query types and workloads, Proceedings. 20th International Conference on Data Engineering, p.313, 2004.
DOI : 10.1109/ICDE.2004.1320007

Y. Zhan and J. Yin, Robust local tangent space alignment via iterative weighted PCA, Neurocomputing, vol.74, issue.11, pp.1985-1993, 2011.
DOI : 10.1016/j.neucom.2010.06.029