A. Gostev, Kaspersky Security Bulletin: Statistics, 2008.

R. Lo, P. Kerchen, R. Crawford, W. Ho, J. Crossley et al., Towards a testbed for malicious code detection, COMPCON Spring '91 Digest of Papers, pp.160-166, 1991.
DOI : 10.1109/CMPCON.1991.128800

X. Wang, W. Yu, A. Champion, X. Fu, and D. Xuan, Detecting worms via mining dynamic program execution.: Security and Privacy in Communications Networks and the Workshops, Third International Conference on, pp.412-421, 2007.

X. Jiang, X. Wang, and D. Xu, Stealthy malware detection and monitoring through VMM-based ???out-of-the-box??? semantic view reconstruction, ACM Transactions on Information and System Security, vol.13, issue.2, 2010.
DOI : 10.1145/1698750.1698752

L. Wenke, S. J. Stolfo, and K. W. Mok, A data mining framework for building intrusion detection models, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), pp.120-132, 1999.
DOI : 10.1109/SECPRI.1999.766909

J. L. Berral, N. Poggi, J. Alonso, R. Gavald, J. Torres et al., Adaptive distributed mechanism against flooding network attacks based on machine learning, Proceedings of the 1st ACM workshop on Workshop on AISec, AISec '08, pp.43-50, 2008.
DOI : 10.1145/1456377.1456389

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.639.9854

M. Kloft, U. Brefeld, D. , P. Gehl, C. Laskov et al., Automatic feature selection for anomaly detection, Proceedings of the 1st ACM workshop on Workshop on AISec, AISec '08
DOI : 10.1145/1456377.1456395

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.422.5468

Q. Renchao, L. Tao, and Z. Yu, An immune inspired model for obfuscated virus detection, 2009 International Conference on Industrial Mechatronics and Automation, pp.228-231, 2009.
DOI : 10.1109/ICIMA.2009.5156602

J. R. Landis and G. G. Koch, The Measurement of Observer Agreement for Categorical Data, Biometrics, vol.33, issue.1, 1977.
DOI : 10.2307/2529310

R. C. Holte, Very simple classification rules perform well on most commonly used datasets, Machine Learning, vol.11, issue.1, pp.63-91, 1993.
DOI : 10.1023/A:1022631118932

R. Moskovitch, Y. Elovici, and L. Rokach, Detection of unknown computer worms based on behavioral classification of the host, Computational Statistics & Data Analysis, vol.52, issue.9, pp.4544-4566, 2008.
DOI : 10.1016/j.csda.2008.01.028

I. H. Witten and E. Frank, Data mining, ACM SIGMOD Record, vol.31, issue.1, 2005.
DOI : 10.1145/507338.507355

A. Gostev, Rustock and All That, 2008.